LogoLogo
HomeArticlesCommunity ProductsPremium ProductsGitHubTalsec Website
  • 👋Introduction
  • 🛠️Integration
    • 🤖Android
      • API
      • Troubleshooting
    • 🍎iOS
      • API
      • Troubleshooting
    • 🐦Flutter
      • FlutterFlow
      • API
      • Troubleshooting
    • ⚛️React Native
      • Expo
      • API
      • Troubleshooting
    • 👾Cordova
      • API
      • Troubleshooting
    • 🪽Capacitor
      • API
      • Troubleshooting
  • 🚀Features and Pricing plans
    • The Key Differences: freeRASP vs. RASP+
  • 🎤What's New and Changelog
  • 📊Security Report
  • ⚖️User Data Policies
  • 📄License
  • 🤝Fair Usage Policy (FUP)
  • ℹ️Wiki
    • Getting Signing Certificate Hash
    • Callback Delay, Telemetry Impact, and Threat Scanning Completion Status
    • Threat detection
      • Detecting rooted or jailbroken devices
      • Emulator detection
      • Hook detection
      • App tampering detection
      • Debugger detection
      • Detecting unofficial installation
      • Device binding detection
      • Missing obfuscation detection [Android devices only]
      • Secure Hardware detection (Keystore/Keychain secure storage check)
      • Passcode
      • System VPN detection
      • Developer Mode detection [Android devices only]
      • ADB enabled detection [Android devices only]
      • Screen Capture
    • Source code obfuscation
    • isProd flag
  • 🦉FAQ
  • 🧑‍💻About Us
  • 🤝Contribution
Powered by GitBook

Introduction

Last updated 18 days ago

Was this helpful?

freeRASP is a lightweight and easy-to-integrate mobile security library designed to protect apps from potential threats during the application's runtime. It contains multiple security checks, each aimed to cover possible attack vectors to ensure a high level of application security.

What does freeRASP do?

freeRASP provides protection against potentially dangerous behaviour, including the following:

  • Using rooted or jailbroken devices (e.g., su, Magisk, unc0ver, check1rain, Dopamine).

  • Reverse engineering attempts.

  • Running hooking frameworks (e.g., Frida, Xposed or Shadow).

  • Tampering or repackaging the application.

  • Installing the app through untrusted methods/unofficial stores.

  • Running the app in various emulators.

  • Screenshot and screen recording attempts.

Advantages

  • Reactions to various attacks and detected security threats via an API (callback mechanism).

  • Simple integration.

  • VPN and Developer Mode (Android) detection.

  • ADB, Developer Mode, USB debugging detections.

  • No significant effect on the app performance.

Limitations

  • Data collection from your app to Talsec DB.

  • Security protections:

    • basic protection against root/jailbreak (including Magisk, Dopamine),

    • basic runtime reverse engineering controls,

    • basic runtime integrity controls.

  • No overlay and accessibility services misuse protection.

Workflow scheme

Supported platforms

freeRASP is currently supported for:

freeRASP is currently tested and compatible with:

  • 🤖 Android smartphones, tablets, emulators, Android TVs

  • 🍎 iPhones, iPads, simulators

Discover freeRASP

You can read more about the concept of RASP (Runtime application self-protection) .

Weekly via email indicating the security status of devices and app integrity.

Fulfills requirements.

Top apps rely on Talsec SDKs—see them .

Limits of (limited to 100k app downloads).

Learn more about the limitations of freeRASP .

👋
here
security report
OWASP MASVS-RESILIENCE
here
Fair Usage Policy
Android
iOS
Flutter
React Native
Cordova
Capacitor
here
Cover

Integration

Integrate freeRASP for your platform

Cover

Security Reports

Learn about regular security reports

Cover

License

How is freeRASP licensed

Cover

Commercial Subscriptions

Get maximum protection for your app

Cover

User Data Policies

Learn how we process your data

Cover

Community [Apply to Join!]

Space for developer's creativity, community programs