# Introduction

## Featured AppSec Collections

<details>

<summary>Mobile and API Threat Detection &#x26; Defense (Rooting, Hooking, Reverse Engineering)</summary>

*Technical articles focused on advanced strategies to detect and defend against mobile threats, including rooting, hooking, reverse engineering, and API abuse.*

[How to Block Screenshots, Screen Recording, and Remote Access Tools in Android and iOS Apps](/appsec-articles/articles/how-to-block-screenshots-screen-recording-and-remote-access-tools-in-android-and-ios-apps.md)

[Flutter Security 101: Restricting Installs to Protect Your App from Unofficial Sources](/appsec-articles/articles/flutter-security-101-restricting-installs-to-protect-your-app-from-unofficial-sources.md)

[Emulators in Gaming: Threats and Detections](/appsec-articles/articles/emulators-in-gaming-threats-and-detections.md)

[Hacking and protection of Mobile Apps and backend APIs | 2024 Talsec Threat Modeling Exercise](/appsec-articles/articles/hacking-and-protection-of-mobile-apps-and-backend-apis-or-2024-talsec-threat-modeling-exercise.md)

[Detect system VPNs with freeRASP](/appsec-articles/articles/detect-system-vpns-with-freerasp.md)

[Safeguarding Your Data in React Native: Secure Storage Solutions](/appsec-articles/articles/safeguarding-your-data-in-react-native-secure-storage-solutions.md)

[Obfuscation of Mobile Apps](/appsec-articles/articles/obfuscation-of-mobile-apps.md)

</details>

<details>

<summary>Talsec RASP+, AppiCrypt and freeRASP Guides and Features</summary>

*This collection highlights cutting-edge tools and resources from Talsec designed to secure mobile apps through runtime application self-protection (RASP), API integrity checks, and anti-abuse measures.*

[React Native Secure Boilerplate 2024: Ignite with freeRASP](/appsec-articles/articles/react-native-secure-boilerplate-2024-ignite-with-freerasp.md)

[Mobile API Anti-abuse Protection with AppiCrypt®: A New Play Integrity and DeviceCheck Alternative](/appsec-articles/articles/mobile-api-anti-abuse-protection-with-appicrypt-r-a-new-play-integrity-and-devicecheck-alternative.md)

[Introducing Talsec’s advanced malware protection!](/appsec-articles/articles/introducing-talsecs-advanced-malware-protection.md)

[Enhancing Capacitor App Security with freeRASP: Your Shield Against Threats 🛡️](/appsec-articles/articles/enhancing-capacitor-app-security-with-freerasp-your-shield-against-threats.md)

[Build secure apps in React Native](/appsec-articles/articles/build-secure-apps-in-react-native.md)

</details>

<details>

<summary>OWASP TOP 10 for Flutter</summary>

*Series of artiles written by Majid Hajian discussing each threat of OWASP TOP 10, in context of Flutter and its security.*

[OWASP Top 10 For Flutter - M1: Mastering Credential Security in Flutter](/appsec-articles/articles/owasp-top-10-for-flutter-m1-mastering-credential-security-in-flutter.md)

[OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter](/appsec-articles/articles/owasp-top-10-for-flutter-m2-inadequate-supply-chain-security-in-flutter.md)

[OWASP Top 10 For Flutter – M3: Insecure Authentication and Authorization in Flutter](/appsec-articles/articles/owasp-top-10-for-flutter-m3-insecure-authentication-and-authorization-in-flutter.md)

[OWASP Top 10 For Flutter – M4: Insufficient Input/Output Validation in Flutter](/appsec-articles/articles/owasp-top-10-for-flutter-m4-insufficient-input-output-validation-in-flutter.md)

[OWASP Top 10 For Flutter - M5: Insecure Communication for Flutter and Dart](/appsec-articles/articles/owasp-top-10-for-flutter-m5-insecure-communication-for-flutter-and-dart.md)

[OWASP Top 10 For Flutter – M6: Inadequate Privacy Controls in Flutter & Dart](/appsec-articles/articles/owasp-top-10-for-flutter-m6-inadequate-privacy-controls-in-flutter-and-dart.md)

[OWASP Top 10 For Flutter – M7: Insufficient Binary Protection in Flutter & Dart](/appsec-articles/articles/owasp-top-10-for-flutter-m7-insufficient-binary-protection-in-flutter-and-dart.md)

[OWASP Top 10 For Flutter – M8: Security Misconfiguration in Flutter & Dart](/appsec-articles/articles/owasp-top-10-for-flutter-m8-security-misconfiguration-in-flutter-and-dart.md)

[OWASP Top 10 For Flutter – M9: Insecure Data Storage in Flutter & Dart](/appsec-articles/articles/owasp-top-10-for-flutter-m9-insecure-data-storage-in-flutter-and-dart.md)

[OWASP Top 10 For Flutter – M10: Insufficient Cryptography in Flutter & Dart](/appsec-articles/articles/owasp-top-10-for-flutter-m10-insufficient-cryptography-in-flutter-and-dart.md)

</details>

<details>

<summary>Flutter Security</summary>

*At Talsec, we’re proud to lead the way as the **#1 Flutter Security SDK**, and our commitment to this growing framework runs deep. This curated collection showcases our ongoing efforts to protect Flutter apps.*

[Flutter Security 101: Restricting Installs to Protect Your App from Unofficial Sources](/appsec-articles/articles/flutter-security-101-restricting-installs-to-protect-your-app-from-unofficial-sources.md)

[User Authentication Risks Coverage in Flutter Mobile Apps | TALSEE](/appsec-articles/articles/user-authentication-risks-coverage-in-flutter-mobile-apps-or-talsee.md)

[Secure Storage: What Flutter can do, what Flutter could do](/appsec-articles/articles/secure-storage-what-flutter-can-do-what-flutter-could-do.md)

[🔒 Flutter Plugin Attack: Mechanics and Prevention](/appsec-articles/articles/flutter-plugin-attack-mechanics-and-prevention.md)

[How to Hack & Protect Flutter Apps — Simple and Actionable Guide (Pt. 1/3)](/appsec-articles/articles/how-to-hack-and-protect-flutter-apps-simple-and-actionable-guide-pt.-1-3.md)

[How to Hack & Protect Flutter Apps — OWASP MAS and RASP. (Pt. 2/3)](/appsec-articles/articles/how-to-hack-and-protect-flutter-apps-owasp-mas-and-rasp.-pt.-2-3.md)

[How to Hack & Protect Flutter Apps — Steal Firebase Auth token and attack the API. (Pt. 3/3)](/appsec-articles/articles/how-to-hack-and-protect-flutter-apps-steal-firebase-auth-token-and-attack-the-api.-pt.-3-3.md)

[Missing Hero of Flutter World](/appsec-articles/articles/missing-hero-of-flutter-world.md)

</details>

<details>

<summary>Reports &#x26; Original Research</summary>

*In-depth reports and original research articles focused on mobile app security, fraud prevention, and API protection.*

[Exclusive Research: Unlocking Reliable Crash Tracking with PLCrashReporter for iOS SDKs](/appsec-articles/articles/exclusive-research-unlocking-reliable-crash-tracking-with-plcrashreporter-for-ios-sdks.md)

[How to test a RASP? OWASP MAS: RASP Techniques Not Implemented \[MASWE-0103\]](/appsec-articles/articles/how-to-test-a-rasp-owasp-mas-rasp-techniques-not-implemented-maswe-0103.md)

[Flutter CTO Report 2024: Flutter App Security Trends](/appsec-articles/articles/flutter-cto-report-2024-flutter-app-security-trends.md)

[Fraud-Proofing an Android App: Choosing the Best Device ID for Promo Abuse Prevention](/appsec-articles/articles/fraud-proofing-an-android-app-choosing-the-best-device-id-for-promo-abuse-prevention.md)

[Protecting Your API from App Impersonation: Token Hijacking Guide and Mitigation of JWT Theft](/appsec-articles/articles/protecting-your-api-from-app-impersonation-token-hijacking-guide-and-mitigation-of-jwt-theft.md)

[5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s](/appsec-articles/articles/5-things-john-learned-fighting-hackers-of-his-app-a-must-read-for-pms-and-cisos.md)

</details>

<details>

<summary>Talsec Mobile App Security Conference 2025</summary>

*Summary of talks and keynotes from Talsec Mobile App Security Conference 2025 in shortened article form with video attached as well.*

[Keynote: Discovering the Power of AI Pentesting with Pedro Conde (Ethiack)](/appsec-articles/articles/keynote-discovering-the-power-of-ai-pentesting-with-pedro-conde-ethiack.md)

[Keynote: Red Teaming in Practice with Adam Žilla (Haxoris)](/appsec-articles/articles/keynote-red-teaming-in-practice-with-adam-zilla-haxoris.md)

[Keynote: Raising the Bar with Software Protection with Béatrice Creusillet (Quarkslab)](/appsec-articles/articles/keynote-raising-the-bar-with-software-protection-with-beatrice-creusillet-quarkslab.md)

[Keynote: 20 Minutes to Banking-Grade Security with Mateusz Wojtczak (LeanCode)](/appsec-articles/articles/keynote-20-minutes-to-banking-grade-security-with-mateusz-wojtczak-leancode.md)

[Keynote: Communty-Driven Security as Collective Defense with Tomáš Soukal (Talsec)](/appsec-articles/articles/keynote-communty-driven-security-as-collective-defense-with-tomas-soukal-talsec.md)

[Keynote: Cloudflare for AppSec with Anatol Nikiforov (Cloudflare)](/appsec-articles/articles/keynote-cloudflare-for-appsec-with-anatol-nikiforov-cloudflare.md)

[Keynote: Fingerprinting, Device Intel & Context with Martin Makarský (Fingerprint)](/appsec-articles/articles/keynote-fingerprinting-device-intel-and-context-with-martin-makarsky-fingerprint.md)

[TechTalk: Threshold Cryptography with Jan Kvapil (MUNI)](/appsec-articles/articles/techtalk-threshold-cryptography-with-jan-kvapil-muni.md)

[TechTalk: Best Practices for Keeping Your App Safe with Majid Hajian (Microsoft)](/appsec-articles/articles/techtalk-best-practices-for-keeping-your-app-safe-with-majid-hajian-microsoft.md)

[TechTalk: Predictive Apps Protection with Sergiy Yakymchuk (Talsec)](/appsec-articles/articles/techtalk-predictive-apps-protection-with-sergiy-yakymchuk-talsec.md)

[Opening Keynote: Safety/Security Equilibrium with Sergiy Yakymchuk (Talsec)](/appsec-articles/articles/opening-keynote-safety-security-equilibrium-with-sergiy-yakymchuk-talsec.md)

[TT: The AI Impersonator: Runtime Defense Against Machine-Generated Deception with Dmitri Bogatenkov](/appsec-articles/articles/tt-the-ai-impersonator-runtime-defense-against-machine-generated-deception-with-dmitri-bogatenkov.md)

[Panel: Engineers vs. Reverse Engineers](/appsec-articles/articles/panel-engineers-vs.-reverse-engineers.md)

</details>

## Latest Articles

Articles by our team members and guest experts ([become one of them](https://docs.talsec.app/community)) that explore practical mobile security and threat defense topics for the developer community.

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="image">Cover image</th></tr></thead><tbody><tr><td>New features in Talsec Portal</td><td><a href="/pages/dVpDzbX0DDr1qj5BG6Q0">/pages/dVpDzbX0DDr1qj5BG6Q0</a></td><td><a href="/files/5ArXLni12qpWzWpSNktI">/files/5ArXLni12qpWzWpSNktI</a></td></tr><tr><td>How Our Partnership With Gen Digital Enabled Malware Detection v2 Powered by Avast and Norton DBs</td><td><a href="/pages/yCzL2YAB6FBSexbhgFVQ">/pages/yCzL2YAB6FBSexbhgFVQ</a></td><td><a href="/files/r0hB2ryPYfPKDBF0lFLu">/files/r0hB2ryPYfPKDBF0lFLu</a></td></tr><tr><td>Talsec Global Threat Report 2025</td><td><a href="/pages/n5Wh0UXrIxiySaRQYrxY">/pages/n5Wh0UXrIxiySaRQYrxY</a></td><td><a href="/files/IXjAdkU0g0mMPSurjJ4m">/files/IXjAdkU0g0mMPSurjJ4m</a></td></tr><tr><td>Panel: Engineers vs. Reverse Engineers</td><td><a href="/pages/h8to21ODeX3NgLwMOH1e">/pages/h8to21ODeX3NgLwMOH1e</a></td><td><a href="/files/gVXWJFKPPAbh1Mr4oU6o">/files/gVXWJFKPPAbh1Mr4oU6o</a></td></tr><tr><td>The AI Impersonator: Runtime Defense Against Machine-Generated Deception with Dmitri Bogatenkov</td><td><a href="/pages/xTZvJRQSed2p57pukuub">/pages/xTZvJRQSed2p57pukuub</a></td><td><a href="/files/OKt4jjqi4RRb8IlcvtgJ">/files/OKt4jjqi4RRb8IlcvtgJ</a></td></tr><tr><td>How to Stop Bots Without CAPTCHA</td><td><a href="/pages/bfM2GjPHOIt49mmTlWrA">/pages/bfM2GjPHOIt49mmTlWrA</a></td><td><a href="/files/dPHX2enJL6ydolLKzuld">/files/dPHX2enJL6ydolLKzuld</a></td></tr><tr><td>Opening Keynote: Safety/Security Equilibrium with Sergiy Yakymchuk (Talsec)</td><td><a href="/pages/PbMA0HBmWQx3g1a4zoMC">/pages/PbMA0HBmWQx3g1a4zoMC</a></td><td><a href="/files/sEvOsPp5Th55OgEux36v">/files/sEvOsPp5Th55OgEux36v</a></td></tr><tr><td>TechTalk: Predictive Apps Protection with Sergiy Yakymchuk (Talsec)</td><td><a href="/pages/tt9golJxZg2ZYI1iuRth">/pages/tt9golJxZg2ZYI1iuRth</a></td><td><a href="/files/n11T2SaLvSqtearZuafO">/files/n11T2SaLvSqtearZuafO</a></td></tr><tr><td>TechTalk: Best Practices for Keeping Your App Safe with Majid Hajian (Microsoft)</td><td><a href="/pages/rSa1LuyiutWw7fj2PGkC">/pages/rSa1LuyiutWw7fj2PGkC</a></td><td><a href="/files/PjtrvcBTGmFCLGeasz5a">/files/PjtrvcBTGmFCLGeasz5a</a></td></tr><tr><td>OWASP Top 10 For Flutter – M10: Insufficient Cryptography in Flutter &#x26; Dart</td><td><a href="/pages/KfmEFydl7MQCnzvfaUOm">/pages/KfmEFydl7MQCnzvfaUOm</a></td><td><a href="/files/TRhQWWbv0kEkIxkAaSnD">/files/TRhQWWbv0kEkIxkAaSnD</a></td></tr><tr><td>Android Malware Detection SDK for Your App: Detect Risky &#x26; Suspicious Apps and Known Malware</td><td><a href="/pages/6683740b8fd03d956f9b2a264a0801cc5715eff8">/pages/6683740b8fd03d956f9b2a264a0801cc5715eff8</a></td><td><a href="/files/gtOXAQmSp4u3x1YlBbhv">/files/gtOXAQmSp4u3x1YlBbhv</a></td></tr><tr><td>OWASP Top 10 For Flutter – M9: Insecure Data Storage in Flutter &#x26; Dart</td><td><a href="/pages/YMgNoINfxB2PonTaPwGq">/pages/YMgNoINfxB2PonTaPwGq</a></td><td><a href="/files/9Pm2kiu8SsP6mtTBWsts">/files/9Pm2kiu8SsP6mtTBWsts</a></td></tr><tr><td>OWASP Top 10 For Flutter – M8: Security Misconfiguration in Flutter &#x26; Dart</td><td><a href="/pages/ApvZ4VPOocf9gxSV43MN">/pages/ApvZ4VPOocf9gxSV43MN</a></td><td><a href="/files/5QIbIOBIn1UUBii4gjql">/files/5QIbIOBIn1UUBii4gjql</a></td></tr><tr><td>OWASP Top 10 For Flutter – M7: Insufficient Binary Protection in Flutter &#x26; Dart</td><td></td><td><a href="/files/mPTMMg7UjGb71pYIKuGb">/files/mPTMMg7UjGb71pYIKuGb</a></td></tr><tr><td>Talsec RASP+ and AppiCrypt for Apple TV Apps</td><td><a href="/pages/msBgF7QvPUIan0uUbzss">/pages/msBgF7QvPUIan0uUbzss</a></td><td><a href="/files/S4jSh50OvlLWHIPCdMFq">/files/S4jSh50OvlLWHIPCdMFq</a></td></tr><tr><td>TechTalk: Threshold Cryptography with Jan Kvapil (MUNI)</td><td><a href="/pages/NiH1MnoFvSgKpDqB5hDn">/pages/NiH1MnoFvSgKpDqB5hDn</a></td><td><a href="/files/eo5ca1X1pi7Br0B46Ae2">/files/eo5ca1X1pi7Br0B46Ae2</a></td></tr><tr><td>Keynote: Fingerprinting, Device Intel &#x26; Context with Martin Makarský (Fingerprint)</td><td><a href="/pages/fpgMHoIPgbZ5Dczy72KS">/pages/fpgMHoIPgbZ5Dczy72KS</a></td><td><a href="/files/bxLtEWXybqrTqz2TkP66">/files/bxLtEWXybqrTqz2TkP66</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>How To Detect Video Injection for KYC</td><td><a href="/files/Q751PVNQhkmHZrmtu85V">/files/Q751PVNQhkmHZrmtu85V</a></td><td><a href="/pages/QoKwRewMPIZdNYh4tvYu">/pages/QoKwRewMPIZdNYh4tvYu</a></td></tr><tr><td>Keynote: Cloudflare for AppSec with Anatol Nikiforov (Cloudflare)</td><td><a href="/files/flvNWLZ0i1aNwvHFUnbH">/files/flvNWLZ0i1aNwvHFUnbH</a></td><td><a href="/pages/qPPBV6jcQAtFYG553CNo">/pages/qPPBV6jcQAtFYG553CNo</a></td></tr><tr><td>Keynote: Communty-Driven Security as Collective Defense with Tomáš Soukal (Talsec)</td><td><a href="/files/QetRxZ1NBtgDAqcrR0km">/files/QetRxZ1NBtgDAqcrR0km</a></td><td><a href="/pages/GwRWCSxbSnvvUC6F5vUr">/pages/GwRWCSxbSnvvUC6F5vUr</a></td></tr><tr><td>Keynote: 20 Minutes to Banking-Grade Security with Mateusz Wojtczak (LeanCode)</td><td><a href="/files/Xsq9QCc2iVnp8VIpvgNZ">/files/Xsq9QCc2iVnp8VIpvgNZ</a></td><td><a href="/pages/UoQoWhi7oHFApSuyc5H6">/pages/UoQoWhi7oHFApSuyc5H6</a></td></tr><tr><td>Keynote: Raising the Bar with Software Protection with Béatrice Creusillet (Quarkslab)</td><td><a href="/files/T53IMHovmZWfZSVHZOP2">/files/T53IMHovmZWfZSVHZOP2</a></td><td><a href="/pages/V0R4PpUnMJjkOfBRMj6M">/pages/V0R4PpUnMJjkOfBRMj6M</a></td></tr><tr><td>Keynote: Red Teaming in Practice with Adam Žilla (Haxoris)</td><td><a href="/files/z3PRy4p1uEFql4yhUm63">/files/z3PRy4p1uEFql4yhUm63</a></td><td><a href="/pages/PZpq5lDvZ6sDVPYYAOvT">/pages/PZpq5lDvZ6sDVPYYAOvT</a></td></tr><tr><td>Keynote: Discovering the Power of AI Pentesting with Pedro Conde (Ethiack)</td><td><a href="/files/DADyOAwO2g1FRIF3EVV8">/files/DADyOAwO2g1FRIF3EVV8</a></td><td><a href="/pages/3cjdrgQBEaKQpbCfAFru">/pages/3cjdrgQBEaKQpbCfAFru</a></td></tr><tr><td>How to Detect Jailbreak using Capacitor</td><td><a href="/files/XgnkZSCN3TnElWlNHCOc">/files/XgnkZSCN3TnElWlNHCOc</a></td><td><a href="/pages/QKgMvDvtDRABiH54hx5K">/pages/QKgMvDvtDRABiH54hx5K</a></td></tr><tr><td>How to Detect Hooking using Capacitor</td><td><a href="/files/GwctT61o2PvnRpprfq2v">/files/GwctT61o2PvnRpprfq2v</a></td><td><a href="/pages/f4rbcoUr4X4AxKVbrlMz">/pages/f4rbcoUr4X4AxKVbrlMz</a></td></tr><tr><td>freeRASP for Kotlin Multiplatform Guide</td><td><a href="/files/u3aXqbRmFDs1IkWDfp0C">/files/u3aXqbRmFDs1IkWDfp0C</a></td><td><a href="/pages/ODfGs9k1KHhNJnoYUVbi">/pages/ODfGs9k1KHhNJnoYUVbi</a></td></tr><tr><td>Achieving Cloudflare Outage Resilience using AppiCryptWeb</td><td><a href="/files/Ts2zhwe1CCx0hwwVimJb">/files/Ts2zhwe1CCx0hwwVimJb</a></td><td><a href="/pages/ALHxUdpgmFEmvWKdByBu">/pages/ALHxUdpgmFEmvWKdByBu</a></td></tr><tr><td>How to Detect Root on React Native</td><td><a href="/files/XBjhvZq6qOiTkphcnzGg">/files/XBjhvZq6qOiTkphcnzGg</a></td><td><a href="/pages/355lzIPBjcRLxH3yKiyk">/pages/355lzIPBjcRLxH3yKiyk</a></td></tr><tr><td>How to Detect Jailbreak on React Native</td><td><a href="/files/3F7Myp586fiJiVc5CHGv">/files/3F7Myp586fiJiVc5CHGv</a></td><td><a href="/pages/Q2IAXHCdIvNGpZxbyYuh">/pages/Q2IAXHCdIvNGpZxbyYuh</a></td></tr><tr><td>How to Prevent Magisk Root Hiding and Security Bypass</td><td><a href="/files/98sVHDWRLsVjTINT1Xa9">/files/98sVHDWRLsVjTINT1Xa9</a></td><td><a href="/pages/mJxnAQ4PPp41XzuFEsiv">/pages/mJxnAQ4PPp41XzuFEsiv</a></td></tr><tr><td>How to Detect Hooking (Frida) on React Native</td><td><a href="/files/kOc3aSrDDgyUu9RYP5Pd">/files/kOc3aSrDDgyUu9RYP5Pd</a></td><td><a href="/pages/LZn6pVhUt0nTbD0RSwKp">/pages/LZn6pVhUt0nTbD0RSwKp</a></td></tr><tr><td>How to Detect a Weak Wi-Fi: Guide to In-App Network Security Checks</td><td><a href="/files/4zBRLei3LCSaoVM8Mh3k">/files/4zBRLei3LCSaoVM8Mh3k</a></td><td><a href="/pages/WPXMFULDctN7i6CUqr22">/pages/WPXMFULDctN7i6CUqr22</a></td></tr><tr><td>Future-Proofing for the Data-Driven Ecosystem: Securing Your Application and Data APIs</td><td><a href="/files/gXLAFQmC152x0SToobq9">/files/gXLAFQmC152x0SToobq9</a></td><td><a href="/pages/3Fm4Q6Cu0PH4rIphzMij">/pages/3Fm4Q6Cu0PH4rIphzMij</a></td></tr><tr><td>freeRASP for Unreal Engine: Secure Your Revenue</td><td><a href="/files/B5kjC7ZLUVqJZVUOrLyB">/files/B5kjC7ZLUVqJZVUOrLyB</a></td><td><a href="/pages/a81N7wiQSdazSiuT3XAn">/pages/a81N7wiQSdazSiuT3XAn</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>How to Detect Screen Capture &#x26; Recording using Kotlin</td><td><a href="/files/bGRm1O1Xf8SvBLVCIRh9">/files/bGRm1O1Xf8SvBLVCIRh9</a></td><td><a href="/pages/wV2v9M12yFgdsAIzGmZn">/pages/wV2v9M12yFgdsAIzGmZn</a></td></tr><tr><td>How to Detect Developer Mode on Android using Kotlin</td><td><a href="/files/r6S338gqzRvID8CQDzeb">/files/r6S338gqzRvID8CQDzeb</a></td><td><a href="/pages/fKdc5eWc0Do8spaUBArh">/pages/fKdc5eWc0Do8spaUBArh</a></td></tr><tr><td>How to Detect App Tampering &#x26; Repackaging using Kotlin</td><td><a href="/files/8qKr4thKFuQ71Px8MKHz">/files/8qKr4thKFuQ71Px8MKHz</a></td><td><a href="/pages/2n712FWPARywIqOIL6Rz">/pages/2n712FWPARywIqOIL6Rz</a></td></tr><tr><td>How to Detect Jailbreak on Flutter</td><td><a href="/files/q1QIWFSN9Ygt8w8S9vx4">/files/q1QIWFSN9Ygt8w8S9vx4</a></td><td><a href="/pages/gRafWIwxUwVemDKHt593">/pages/gRafWIwxUwVemDKHt593</a></td></tr><tr><td>How to Detect Root on Flutter</td><td><a href="/files/faagagwsqF0kPFS7ge6s">/files/faagagwsqF0kPFS7ge6s</a></td><td><a href="/pages/ANdGjObq4OLjMSTCpyUR">/pages/ANdGjObq4OLjMSTCpyUR</a></td></tr><tr><td>How to Detect Hooking (Frida) on Flutter</td><td><a href="/files/iMYB8LhC6tU4xLqSnm0Y">/files/iMYB8LhC6tU4xLqSnm0Y</a></td><td><a href="/pages/RJTM5xAD9MV6DQ6dVmHC">/pages/RJTM5xAD9MV6DQ6dVmHC</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>How Secure Are Flutter Apps?</td><td><a href="/files/hppkxuew6iMTHQPzqUAh">/files/hppkxuew6iMTHQPzqUAh</a></td><td><a href="/pages/BFD7LSSWOZeVb7UXSxj6">/pages/BFD7LSSWOZeVb7UXSxj6</a></td></tr><tr><td>How to Detect Emulator in Kotlin</td><td><a href="/files/lWFhLFLVRTyxlmdhu9In">/files/lWFhLFLVRTyxlmdhu9In</a></td><td><a href="/pages/JZyvVN69URyzpyygGoZU">/pages/JZyvVN69URyzpyygGoZU</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>How to Detect Root using Kotlin</td><td><a href="/files/c2O5R1rE6juvxLJJRLOT">/files/c2O5R1rE6juvxLJJRLOT</a></td><td><a href="/pages/iIfIeHsYFpWqnrxsnKFi">/pages/iIfIeHsYFpWqnrxsnKFi</a></td></tr><tr><td>How to Detect Jailbreak using Swift</td><td><a href="/files/fjLe9HzqNA48uVdyy3uO">/files/fjLe9HzqNA48uVdyy3uO</a></td><td><a href="/pages/uigYAwoPcQew6b9lQHJD">/pages/uigYAwoPcQew6b9lQHJD</a></td></tr><tr><td>How to Detect Hooking (Frida) using Kotlin</td><td><a href="/files/t9IFS2Ixev3sSp0HiHk1">/files/t9IFS2Ixev3sSp0HiHk1</a></td><td><a href="/pages/b8tXefr02ZF26kfv8jqO">/pages/b8tXefr02ZF26kfv8jqO</a></td></tr><tr><td>How to Detect Hooking (Frida) using Swift</td><td><a href="/files/zcuZSarlEyRc8iZaJ46c">/files/zcuZSarlEyRc8iZaJ46c</a></td><td><a href="/pages/R1GAfUNSgADNMefuhzHq">/pages/R1GAfUNSgADNMefuhzHq</a></td></tr><tr><td>How to Detect VPN using Swift</td><td><a href="/files/1KkLzkkdZjG8CQHaJTZf">/files/1KkLzkkdZjG8CQHaJTZf</a></td><td><a href="/pages/KlmQo1RzqY36vLwMZZB2">/pages/KlmQo1RzqY36vLwMZZB2</a></td></tr><tr><td>How to Detect VPN using Kotlin</td><td><a href="/files/CbgOBi3GqSImqWcbubqs">/files/CbgOBi3GqSImqWcbubqs</a></td><td><a href="/pages/I8Od1moCedSo7hcfpV56">/pages/I8Od1moCedSo7hcfpV56</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>AppiCrypt Against Time Spoofing: From Free Trial Abuse to License Fraud and Audit Log Corruption</td><td><a href="/files/f6vS4ksBouX25qI3vmv3">/files/f6vS4ksBouX25qI3vmv3</a></td><td><a href="/pages/Vo2Uzmm4yMN2chEByCGs">/pages/Vo2Uzmm4yMN2chEByCGs</a></td></tr><tr><td>Preventing Piracy and Cheating in Games: A Guide to Countering GameGuardian with Talsec</td><td><a href="/files/NjRIHW5vMCIHTIRKs16B">/files/NjRIHW5vMCIHTIRKs16B</a></td><td><a href="/pages/iuEyTIJ2bp6rUt6BMUo1">/pages/iuEyTIJ2bp6rUt6BMUo1</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>iOS Keychain vs. Android Keystore</td><td><a href="/files/cWQ4rvHP3Jrq7kJdsTwM">/files/cWQ4rvHP3Jrq7kJdsTwM</a></td><td><a href="/pages/pSdjbBonypf3bDiRkXg3">/pages/pSdjbBonypf3bDiRkXg3</a></td></tr><tr><td>Introducing Multi-Instancing Detection for freeRASP</td><td><a href="/files/LDJp2n64pZTJ2rUf3WnA">/files/LDJp2n64pZTJ2rUf3WnA</a></td><td><a href="/pages/7WLpOeny9JeBPLGr1AlG">/pages/7WLpOeny9JeBPLGr1AlG</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>Introducing the Talsec Portal: A New Way to Monitor Your App — Try It Now!</td><td><a href="/files/rUOc7gHw2iz4PJHq1gtS">/files/rUOc7gHw2iz4PJHq1gtS</a></td><td><a href="/pages/R0k2rwpOEWhqRc9Vtsek">/pages/R0k2rwpOEWhqRc9Vtsek</a></td></tr><tr><td>How to Achieve Root-Like Control Without Rooting: Shizuku's Perils &#x26; Talsec's Root Detection</td><td><a href="/files/yLoFXzDdEOnPfalVpBpL">/files/yLoFXzDdEOnPfalVpBpL</a></td><td><a href="/pages/W8l3wxRyKE6sK1f1wKZi">/pages/W8l3wxRyKE6sK1f1wKZi</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>freeRASP for Unity Guide [new!]</td><td><a href="/files/WfsjsoTD7bcQbf8vLQMg">/files/WfsjsoTD7bcQbf8vLQMg</a></td><td><a href="/pages/S1VGgTLsuKJg44rjOoaM">/pages/S1VGgTLsuKJg44rjOoaM</a></td></tr><tr><td>ApkSignatureKiller: How it Works and How Talsec Protects Your Apps</td><td><a href="/files/NLLktverYAONwPKbAd8U">/files/NLLktverYAONwPKbAd8U</a></td><td><a href="/pages/G2W7Pmtb7asqh890doGN">/pages/G2W7Pmtb7asqh890doGN</a></td></tr><tr><td>AI Device Risk Summary Demo | Threat Protection | Risk Scoring | Malware Detection | Android &#x26; iOS</td><td><a href="/files/A4Wwxg193uvTiC1xZaAd">/files/A4Wwxg193uvTiC1xZaAd</a></td><td><a href="/pages/7f4o8qZWEjDgnVIoywIT">/pages/7f4o8qZWEjDgnVIoywIT</a></td></tr><tr><td>Podcast: iOS Keychain vs Android Keystore</td><td><a href="/files/QBoiNL9MIBaLOtFo17MC">/files/QBoiNL9MIBaLOtFo17MC</a></td><td><a href="/pages/A2MextvXArpTkErEUBnC">/pages/A2MextvXArpTkErEUBnC</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>Obfuscation of Mobile Apps</td><td><a href="/files/QJLOv6T4Tu4dhMhyUaVC">/files/QJLOv6T4Tu4dhMhyUaVC</a></td><td><a href="/pages/0bJPc9MNqMsqkF5eCAcY">/pages/0bJPc9MNqMsqkF5eCAcY</a></td></tr><tr><td>OWASP Top 10 For Flutter – M6: Inadequate Privacy Controls in Flutter &#x26; Dart</td><td><a href="/files/1dkYDllqSSleCD0tGluR">/files/1dkYDllqSSleCD0tGluR</a></td><td><a href="/pages/pMUAYcYTTHBq0gtOvBf7">/pages/pMUAYcYTTHBq0gtOvBf7</a></td></tr><tr><td>Simple Root Detection: Implementation and verification</td><td><a href="/files/yp7GZ7RZ4QaDmEAWoAT6">/files/yp7GZ7RZ4QaDmEAWoAT6</a></td><td><a href="/pages/B0F2aSgM8qwqjQdr39Oi">/pages/B0F2aSgM8qwqjQdr39Oi</a></td></tr><tr><td>Flutter - M5: Insecure Communication for Flutter and Dart</td><td><a href="/files/TM6WCoGQy5R5AUK9OPUM">/files/TM6WCoGQy5R5AUK9OPUM</a></td><td><a href="/pages/BJ1m8HycQZu2NuOA8pZl">/pages/BJ1m8HycQZu2NuOA8pZl</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td>OWASP Top 10 For Flutter – M4: Insufficient Input/Output Validation in Flutter</td><td></td><td></td><td><a href="/pages/TbxuYVCmxId3HyD66PRt">/pages/TbxuYVCmxId3HyD66PRt</a></td><td><a href="/files/4S96ivUooLR7wJXdZH9E">/files/4S96ivUooLR7wJXdZH9E</a></td></tr><tr><td>OWASP Top 10 For Flutter – M3: Insecure Authentication and Authorization in Flutter</td><td></td><td></td><td><a href="/pages/FX4YUY7DAd85AdyDaiB7">/pages/FX4YUY7DAd85AdyDaiB7</a></td><td><a href="/files/MOtgoQIUZiqtt3JaKazg">/files/MOtgoQIUZiqtt3JaKazg</a></td></tr><tr><td>OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter</td><td></td><td></td><td><a href="/pages/yO5C0OrHUKx0YVedwp3x">/pages/yO5C0OrHUKx0YVedwp3x</a></td><td><a href="/files/gGdNSXRs4BLhX0NzAYdP">/files/gGdNSXRs4BLhX0NzAYdP</a></td></tr><tr><td>OWASP Top 10 For Flutter - M1: Mastering Credential Security in Flutter</td><td></td><td></td><td><a href="/pages/7gTw2oUW9M5LIo8iXduC">/pages/7gTw2oUW9M5LIo8iXduC</a></td><td><a href="/files/GOLQ6JZf1EzbxfsIFlvy">/files/GOLQ6JZf1EzbxfsIFlvy</a></td></tr><tr><td>🚀A Developer’s Guide to Implement End-to-End Encryption in Mobile Apps 🛡️</td><td></td><td></td><td><a href="/pages/8aGmUWd9VlLxG9AkfQEl">/pages/8aGmUWd9VlLxG9AkfQEl</a></td><td><a href="/files/C08QuwnBbQmLF8D9okkq">/files/C08QuwnBbQmLF8D9okkq</a></td></tr><tr><td>Flutter Security 101: Restricting Installs to Protect Your App from Unofficial Sources</td><td></td><td></td><td><a href="/pages/T14MngIYWao6hM36Duda">/pages/T14MngIYWao6hM36Duda</a></td><td><a href="/files/zTyVl1Bt1uQlSh6jm6hl">/files/zTyVl1Bt1uQlSh6jm6hl</a></td></tr><tr><td>Learn how to implement the Secure Storage in Flutter and understand storage restrictions.</td><td></td><td></td><td><a href="/pages/b9xBcICJbyENuJcTRZFO">/pages/b9xBcICJbyENuJcTRZFO</a></td><td><a href="/files/Vcep8a8iulvAYgrtskT0">/files/Vcep8a8iulvAYgrtskT0</a></td></tr><tr><td>Dive into our full guide as Himesh Panchal walks you through creating a robust and secure authentication flow!</td><td></td><td></td><td><a href="/pages/Hb9KueQXALIQxl9o1nTe">/pages/Hb9KueQXALIQxl9o1nTe</a></td><td><a href="/files/TOdMwrUoJdowhu99NFMB">/files/TOdMwrUoJdowhu99NFMB</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-type="rating" data-max="5"></th></tr></thead><tbody><tr><td>Introduction: Root Detection Basics</td><td><a href="https://docs.talsec.app/glossary/root-detection">https://docs.talsec.app/glossary/root-detection</a></td><td><a href="/files/IaWrvIBsEpPMq217OAyB">/files/IaWrvIBsEpPMq217OAyB</a></td><td>null</td></tr><tr><td>OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter</td><td><a href="/pages/yO5C0OrHUKx0YVedwp3x">/pages/yO5C0OrHUKx0YVedwp3x</a></td><td><a href="/files/gGdNSXRs4BLhX0NzAYdP">/files/gGdNSXRs4BLhX0NzAYdP</a></td><td>null</td></tr><tr><td>Hook, Hack, Defend: Frida's Impact on Mobile Security &#x26; How to Fight Back</td><td><a href="/pages/Sf92UVD2NAAAfZthCgNC">/pages/Sf92UVD2NAAAfZthCgNC</a></td><td><a href="/files/QXsArtlkHWezfQcGpdNg">/files/QXsArtlkHWezfQcGpdNg</a></td><td>null</td></tr><tr><td>Emulators in Gaming: Threats and Detections</td><td><a href="/pages/Kn6FAPqL2oTPrPwsI440">/pages/Kn6FAPqL2oTPrPwsI440</a></td><td><a href="/files/Rvz4QSwFotQtclDJsioY">/files/Rvz4QSwFotQtclDJsioY</a></td><td>null</td></tr><tr><td>Exclusive Research: Unlocking Reliable Crash Tracking with PLCrashReporter for iOS SDKs</td><td><a href="/pages/aEqrWwwSZKnHSw9oKVrc">/pages/aEqrWwwSZKnHSw9oKVrc</a></td><td><a href="/files/IvVrVEQlwoICVs0D2C7r">/files/IvVrVEQlwoICVs0D2C7r</a></td><td>null</td></tr><tr><td>How to Block Screenshots, Screen Recording, and Remote Access Tools in Android and iOS Apps</td><td><a href="/pages/5U638HgKtVvLjSo0nUch">/pages/5U638HgKtVvLjSo0nUch</a></td><td><a href="/files/j7zcYE1hC3b5kIiFKuqf">/files/j7zcYE1hC3b5kIiFKuqf</a></td><td>null</td></tr><tr><td>How do you test a RASP? This guide will walk you through the entire process of RASP evaluation. It is written for penetration testers and RASP integrators.</td><td><a href="/pages/EtjyDwB2m3dSLENMZxCQ">/pages/EtjyDwB2m3dSLENMZxCQ</a></td><td><a href="/files/ne6U2ZbuFdiyy2PO4SOa">/files/ne6U2ZbuFdiyy2PO4SOa</a></td><td>null</td></tr><tr><td>Fact about the origin of the Talsec name</td><td><a href="/pages/mEkYZYSmCL1vavtPP39q">/pages/mEkYZYSmCL1vavtPP39q</a></td><td><a href="/files/IDSr9vzc8D3uFmWOpMFu">/files/IDSr9vzc8D3uFmWOpMFu</a></td><td>null</td></tr><tr><td>React Native Secure Boilerplate 2024: Ignite with freeRASP</td><td><a href="/pages/5lHpXyekMrZ2ZABdk62Z">/pages/5lHpXyekMrZ2ZABdk62Z</a></td><td><a href="/files/vTJb7D82ODyAq1BUPPvc">/files/vTJb7D82ODyAq1BUPPvc</a></td><td>null</td></tr><tr><td>Hacking and protection of Mobile Apps and backend APIs | 2024 Talsec Threat Modeling Exercise</td><td><a href="/pages/OuX0Vp7m9bVk49ebY4VQ">/pages/OuX0Vp7m9bVk49ebY4VQ</a></td><td><a href="/files/O5MADayXoqRdrZ9TqkP6">/files/O5MADayXoqRdrZ9TqkP6</a></td><td>null</td></tr><tr><td>Flutter CTO Report 2024: Flutter App Security Trends</td><td><a href="/pages/sgVhwfLJmdwK3pqYIjio">/pages/sgVhwfLJmdwK3pqYIjio</a></td><td><a href="/files/ioXogg7WszGe3orpD4Mh">/files/ioXogg7WszGe3orpD4Mh</a></td><td>null</td></tr><tr><td>Mobile API Anti-abuse Protection with AppiCrypt®: A New Play Integrity and DeviceCheck Alternative</td><td><a href="/pages/HpEksYdKLJ7NfcF68KZo">/pages/HpEksYdKLJ7NfcF68KZo</a></td><td><a href="/files/fW8pPmKKDmbSZD4Bphma">/files/fW8pPmKKDmbSZD4Bphma</a></td><td>5</td></tr><tr><td>Detect system VPNs with freeRASP</td><td><a href="/pages/EU87yDPF2r33rQTi57w0">/pages/EU87yDPF2r33rQTi57w0</a></td><td><a href="/files/IOTgDmX1ZcL4xhTiVE3c">/files/IOTgDmX1ZcL4xhTiVE3c</a></td><td>null</td></tr><tr><td>Introducing Talsec’s advanced malware protection!</td><td><a href="/pages/Ow2hqKaqbGs0t5owFQRD">/pages/Ow2hqKaqbGs0t5owFQRD</a></td><td><a href="/files/pgG9FOiwyjzBt6JOIr7f">/files/pgG9FOiwyjzBt6JOIr7f</a></td><td>null</td></tr><tr><td>Fraud-Proofing an Android App: Choosing the Best Device ID for Promo Abuse Prevention</td><td><a href="/pages/MnDvO5f00CA4jQ4Qfo9X">/pages/MnDvO5f00CA4jQ4Qfo9X</a></td><td><a href="/files/t0KmarZx3XLRvSTacZel">/files/t0KmarZx3XLRvSTacZel</a></td><td>null</td></tr><tr><td>Enhancing Capacitor App Security with freeRASP: Your Shield Against Threats 🛡️</td><td><a href="/pages/Xwh7WR1nE0rH1LI1HqyP">/pages/Xwh7WR1nE0rH1LI1HqyP</a></td><td><a href="/files/S3W2nu4RL1Ug7hrxq1A1">/files/S3W2nu4RL1Ug7hrxq1A1</a></td><td>null</td></tr><tr><td>Safeguarding Your Data in React Native: Secure Storage Solutions</td><td><a href="/pages/Gvt1uK5O6IFqnRmUnXyJ">/pages/Gvt1uK5O6IFqnRmUnXyJ</a></td><td><a href="/files/00SBDk0oHsz9SBp5BjSY">/files/00SBDk0oHsz9SBp5BjSY</a></td><td>null</td></tr><tr><td>Secure Storage: What Flutter can do, what Flutter could do</td><td><a href="/pages/czg801SLFHcIVUQeyOv0">/pages/czg801SLFHcIVUQeyOv0</a></td><td><a href="/files/JP43u7FWlyJcsG960JyP">/files/JP43u7FWlyJcsG960JyP</a></td><td>null</td></tr><tr><td>🔒 Flutter Plugin Attack: Mechanics and Prevention</td><td><a href="/pages/If2LparR1uuQQtymFOCk">/pages/If2LparR1uuQQtymFOCk</a></td><td><a href="/files/po35a83uPwXPeHYHmutd">/files/po35a83uPwXPeHYHmutd</a></td><td>null</td></tr><tr><td>Protecting Your API from App Impersonation: Token Hijacking Guide and Mitigation of JWT Theft</td><td><a href="/pages/Hj9okJBCqgAsxJrGhzup">/pages/Hj9okJBCqgAsxJrGhzup</a></td><td><a href="/files/5kkEtReRNGv1ZDdT9A3X">/files/5kkEtReRNGv1ZDdT9A3X</a></td><td>null</td></tr><tr><td>Build secure apps in React Native</td><td><a href="/pages/LKhcOzI3bYOrMYFrK3Mu">/pages/LKhcOzI3bYOrMYFrK3Mu</a></td><td><a href="/files/0sFwngiZvNzs9rM3RV4W">/files/0sFwngiZvNzs9rM3RV4W</a></td><td>null</td></tr><tr><td>How to Hack &#x26; Protect Flutter Apps — Simple and Actionable Guide (Pt. 1/3)</td><td><a href="/pages/pQ3KqiCfbqzCWLsLMIwM">/pages/pQ3KqiCfbqzCWLsLMIwM</a></td><td><a href="/files/ArCDHDF9ZWMVfxhvf8rM">/files/ArCDHDF9ZWMVfxhvf8rM</a></td><td>null</td></tr><tr><td>How to Hack &#x26; Protect Flutter Apps — OWASP MAS and RASP. Use them and your project will cut the mustard! (Pt. 2/3)</td><td><a href="/pages/a7VI5g9vXLNGRdYQcsUl">/pages/a7VI5g9vXLNGRdYQcsUl</a></td><td><a href="/files/nV4FgN8wNpRqzWPx0Lbl">/files/nV4FgN8wNpRqzWPx0Lbl</a></td><td>null</td></tr><tr><td>How to Hack &#x26; Protect Flutter Apps — Steal Firebase Auth token and attack the API. (Pt. 3/3)</td><td><a href="/pages/FMrbMoL1p2OQSqKsTZsH">/pages/FMrbMoL1p2OQSqKsTZsH</a></td><td><a href="/files/ArCDHDF9ZWMVfxhvf8rM">/files/ArCDHDF9ZWMVfxhvf8rM</a></td><td>null</td></tr><tr><td>freeRASP meets Cordova</td><td><a href="/pages/gdKyR8T1uxn96PZ3geGv">/pages/gdKyR8T1uxn96PZ3geGv</a></td><td><a href="/files/4xH4CM0CJUSx0v5H5APD">/files/4xH4CM0CJUSx0v5H5APD</a></td><td>null</td></tr><tr><td>Philosophizing security in a mobile-first world</td><td><a href="/pages/m8tJ8UrM4UZvbqp6EB5z">/pages/m8tJ8UrM4UZvbqp6EB5z</a></td><td><a href="/files/9UAJpyafR7a69TRF9Plg">/files/9UAJpyafR7a69TRF9Plg</a></td><td>null</td></tr><tr><td>5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s</td><td><a href="/pages/jWNYvMvXhfikkrOzKQlw">/pages/jWNYvMvXhfikkrOzKQlw</a></td><td><a href="/files/ZdExpcmci5atVVrOUIzn">/files/ZdExpcmci5atVVrOUIzn</a></td><td>null</td></tr><tr><td>Missing Hero of Flutter World</td><td><a href="/pages/x09bmHlHWWg3cEuHtK97">/pages/x09bmHlHWWg3cEuHtK97</a></td><td><a href="/files/XGebr5EZkd6ZfcJOr6GE">/files/XGebr5EZkd6ZfcJOr6GE</a></td><td>null</td></tr></tbody></table>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.talsec.app/appsec-articles/blog.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
