Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
See the most frequent issues occurring during integration.
Currently, there are no commonly present issues solely for the Capacitor development platform. For more general issues or questions, visit FAQ page. You can also check out the Issues section of our GitHub repository, where you can report issues and view existing reports.
freeRASP for React Native is a bare React Native plugin. When installing freeRASP into a project that uses Expo SDK, there may be extra configuration needed.
To integrate freeRASP into the Expo projects, follow the instructions for React Native. After that, continue on this page.
We provide a plugin config that sets up the dependencies of freeRASP without the need to eject the Expo project. It is recommended to use the plugin config. However, manual setup is also possible.
Add the plugin config to your app.json and specify the minSdkVersion (use at least 23). Additionally, if you are using Expo 50, increase the version of R8 above 8.2 with the R8Version property .
Increase minSdkVersion
This can be done in two ways:
update the minSdkVersion property directly in android/build.gradle, or
use expo-build-properties plugin, which updates the property in the prebuild phase. .
Add maven dependency
open android/build.gradle (if you don't see the android folder, run npx expo prebuild -p android in terminal to create it)
add the following dependency under allprojects > repositories:
if not already configured, add also:
See the most frequent issues occurring during integration.
Currently, there are no commonly present issues solely for the Native iOS development platform. For more general issues or questions, visit page. You can also check out the , where you can report issues and view existing reports.
See the most frequent issues occurring during integration.
The most frequent issues occurring during integration:
For more general issues or questions, visit page. You can also check out the , where you can report issues and view existing reports.
See the most frequent issues occurring during integration.
The most frequent issues occurring during integration:
For more general issues or questions, visit page. You can also check out the , where you can report issues and view existing reports.
"plugins":[
[
"freerasp-react-native/app.plugin.js",
{
"android":{
"minSdkVersion":"23",
"R8Version":"8.3.37" // optional for Expo 50
}
}
]
]maven { url "https://europe-west3-maven.pkg.dev/talsec-artifact-repository/freerasp" }maven { url 'https://www.jitpack.io' }implementation 'com.aheaditec.talsec.security:TalsecSecurity-Community:9.6.0-NO_DB'See the most frequent issues occurring during integration.
The most frequent issues occurring during integration:
For more general issues or questions, visit FAQ page. You can also check out the Issues section of our GitHub repository, where you can report issues and view existing reports.
The general flow of the integration can be decomposed into the following steps:
Conforming to the prerequisites, e.g. setting up Android minSdkVersion.
Adding the dependency.
Setting up the configuration for the application, e.g. package name or whether it is production or not (see #Dev vs. Release version).
Handling the detected threats (callbacks).
Starting the SDK.
Enabling the source code obfuscation.
Registering in Data Visualisation Portal to see the data from your apps and compare it to global statistics.
Become familiar with User Data Policies and License.
Looking at , to provide an additional layer of protection by detecting malware or suspicious applications.
Looking at Features and Pricing Plans if you are interested in more advanced solutions to protect your application and business.
The Dev version is intended for development purposes. It allows you to work on your app without interference from security features that could disrupt the process, e.g. if you would implement killing of the application on the debugger callback.
The Release version is meant for production and must always be used for your published app. It enables all security protections provided by freeRASP.
To configure this, set the isProd flag in freeRASP:
Release: isProd = true
Dev: isProd = false
⚠️Dev version disables some detections which won't be triggered during the development process:
Emulator/Simulator
Debugging
Tampering/Repackaging
Unofficial store/source
Obfuscation issues
Developer mode
ADB Enabled
Make sure that you use the Release version for the production.
Choose the relevant section based on your app development platform:
See the most frequent issues occurring during integration.
The most frequent issues occurring during integration:
For more general issues or questions, visit FAQ page. You can also check out the Issues section of our GitHub repository, where you can report issues and view existing reports.
Android
iOS
Flutter
React Native
Cordova
Capacitor
Unity
Unreal Engine


Let's learn the basics about freeRASP protection.
freeRASP is a lightweight and easy-to-integrate mobile security library designed to detect potential threats during the application's runtime. It contains multiple security checks, each aimed to cover possible attack vectors to ensure a high level of application security.
freeRASP provides detection of potentially dangerous behaviour, including the following:
Using devices (e.g., su, Magisk, unc0ver, check1rain, Dopamine).
Reverse engineering attempts.
Running (e.g., Frida, Xposed or Shadow).
the application.
Installing the app through .
Running the app in various .
Detect fake clones and (Parallel Space)
attempts.
Reactions to various attacks and detected security threats via an API (callback mechanism).
Simple integration.
detection.
, , USB debugging detections.
No significant effect on the app performance.
Data visualization Talsec Portal with real-time security insights, global benchmarks, and detailed analytics
Weekly security report via email indicating the security status of devices and app integrity.
Fulfills OWASP MASVS-RESILIENCE requirements.
Limits of Fair Usage Policy (free up to 100k devices).
Data collection from your app to Talsec DB.
Security protections:
basic protection against root/jailbreak (including Magisk, Dopamine),
basic runtime reverse engineering controls,
basic runtime integrity controls.
No protection.
Access real-time security insights, global benchmarks, and detailed analytics!
📊 Real-Time Threat Monitoring: Gain insights into threat counts, types, and occurrences over time.
📈 Global Benchmarking: Benchmark your app's security against global statistics.
📚 Stay informed: Read the latest articles and documentation on app security best practices.
freeRASP is currently supported for:
freeRASP is currently tested and compatible with:
🤖 Android smartphones, tablets, emulators, Android TVs
🍎 iPhones, iPads, simulators
Weekly security status check of your application
Access real-time security insights, global benchmarks, and detailed analytics!
Talsec Portal is a centralized dashboard that visualizes the security data collected by freeRASP from your app, giving you real-time insights into threats, incidents, and benchmarks—so if you're using freeRASP, this is where your app's security intelligence lives.
📊 Real-Time Threat Monitoring: Gain insights into threat counts, types, and occurrences over time.
📈 Global Benchmarking: Benchmark your app's security against global statistics.
📚 Stay informed: Read the latest articles and documentation on app security best practices.
Details about incidents:
Details about devices:
OS version
Screen lock
Biometrics
Hardware-backed Keystore
Real-time activity logs from the application, showing ongoing threats.
Visit the Talsec Portal.
Run through the onboarding wizard and explore demo data.
Discover insights using demo applications and global security statistics.
Click on Login, then Sign Up.
Use the email address (watcherMail) associated with your TalsecConfig.
Create an Organization.
Now, you can view data for your applications. You can invite other users to your organization to see your data (see Organization Settings). The users can also add their applications to your organization to share their data.
Got any questions regarding the Talsec Portal? Feel free to reach out! You can use the chatbot on the Portal or write to us at [email protected].
Description of the freeRASP API
TalsecConfigSpecifies configuration for your app. See the table below for detailed description of the attributes.
appBundleIds
[String]
List of Bundle IDs for the app
["com.talsec.freerasp.demoapp"]
appTeamId
String
Apple Team ID for the signing of the app
"M8AK35..."
watcherMailAddress
String?
The value is automatically used for Security Reports, Product Updates, and Talsec Portal updates, .
Mail has a strict form '[email protected]'.
isProd
Bool?
Defaults to true when undefined. If you want to use the Dev version to make the development process easier, set the parameter to false. Make sure that you have the Release version in the production (i.e. isProd set to true)!
true
public class Talsecpublic static func start(config: TalsecRuntime.TalsecConfig)
The method used to start freeRASP's audit.
public static func blockScreenCapture(enable: Bool, window: UIWindow)
The method blocks the screen capture in specific UIWindow.
public static func isScreenCaptureBlocked(in window: UIWindow) -> Bool
The method returns whether the screen capture is blocked in specific UIWindow.
public static func storeExternalId(externalId: String)
The method stores an externalId into the logs for data collection.
public protocol SecurityThreatHandlerfunc threatDetected(_ securityThreat: TalsecRuntime.SecurityThreat)
Notifier about detected threats.
public protocol TalsecRuntume.RaspExecutionState func onAllChecksFinished()
Notifier about finished threats
public enum SecurityThreat : String, Codable, CaseIterable, EquatableProvides all types of threats detected by freeRASP. Read more about the meaning of the threats in the .
signature
jailbreak
debugger
runtimeManipulation
passcode
simulator
missingSecureEnclave
systemVPN
deviceChange
deviceID
unofficialStore
screenshot
screenRecording
Description of the freeRASP API
TalsecConfigSpecifies configuration for your app. See the table below for a detailed description of the attributes.
public class ThreatListenerpublic ThreatListener(@NonNull ThreatDetected threatsCallback, @Nullable DeviceState deviceStateCallback, @Nullable RaspExecutionState raspExecutionCallback)
Listener for the threats detected by freeRASP
public void registerListener(@NonNull Context context)
Registers your reactions to detected threats with freeRASP.
public void unregisterListener(@NonNull Context context)
Unregisters the reactions to detected threats.
public static void start(@NonNull Context context, @NonNull TalsecConfig config, @Nullable TalsecMode mode)
The method used to start freeRASP's functionality. TalsecMode is an optional parameter that can be used to force the execution of freeRASP in FOREGROUND / BACKGROUND thread (default value is TalsecMode.BACKGROUND).
public static void blockScreenCapture(@NonNull Activity activity, boolean enable)
The method used to block/unblock screen capture.
public static void isScreenCaptureBlocked()
The method used to know the state of screen capture blocking whether blocked or not.
public interface ThreatDetectedSends callbacks to your app when a threat is detected. Read more about the meaning of the callbacks in the .
void onRootDetected()
void onDebuggerDetected()
void onEmulatorDetected()
void onTamperDetected()
void onUntrustedInstallationSourceDetected()
void onHookDetected()
void onDeviceBindingDetected()
void onObfuscationIssuesDetected()
void onScreenshotDetected()
void onScreenRecordingDetected()
void onMultiInstanceDetected()
void onLocationSpoofingDetected()
void onTimeSpoofingDetected()
void onUnsecureWifiDetected()
void onMalwareDetected(@NonNull List<SuspiciousAppInfo> suspiciousApps)
public interface DeviceStateProvides device state listener to get additional information about device state. Read more about the meaning of the device state listeners in the .
void onUnlockedDeviceDetected()
void onHardwareBackedKeystoreNotAvailableDetected()
void onDeveloperModeDetected()
void onADBEnabledDetected()
void onSystemVPNDetected()
public interface RaspExecutionStateA class which represents a set of callbacks that are used to notify the application when state of executing RASP checks changes.
void onAllChecksFinished()
If you want to learn about the differences between freeRASP and BusinessRASP+, you’re in the right place. On this page, we’ll explore the key features and benefits of each option, compare their functionalities, and highlight how the BusinessRASP+ subscription can offer enhanced capabilities and support compared to the freeRASP plan. By the end, you’ll have a clear understanding of which solution best meets your needs and how to make the most of it.
freeRASP is a freemium product, which means there are . For using freeRASP, please refer to the .
and are premium products with a subscription model (which includes SW licenses, SLA, maintenance updates, and more) for SDKs. It is not SaaS, which means we don't introduce any dependency on third-party web services for your mobile solution.
Talsec doesn't collect any customer data within RASP+, while freeRASP SDK sends the diagnostical information to Talsec servers to provide clients with regular security reports and improve the product. You should consider adding Talsec to the list of Data Processors in case of freeRASP usage.
Here are the top 10 benefits of choosing a Talsec RASP+ Business subscription, which includes an SDK license, SLA, and additional services, compared to the freeRASP option.
For any questions, please refer to our or schedule a call with us by choosing a time slot on .
To convert the hash to Base64 form, use an online tool like :
After conversion, you'll receive a final Base64 string like this:
Your work here is done. Insert it into your Talsec configuration.
Example of a Talsec freeRASP configuration in Flutter with the resulting string:
You sign your Android application (APK) yourself using a private key that's stored in a keystore.
A common mistake is using the wrong signing key, which will cause the Talsec SDK to flag your app as a security risk. To avoid this, you must use the keystore that signs your app for public release.
Here’s the difference:
Debug Keystore: Created automatically by Android Studio. DO NOT USE THIS ONE. It is insecure and only for development purposes.
Release Keystore: The secure keystore you create and manage. USE THIS ONE. It's what permanently ties your app to you as the developer.
If you haven't created a release keystore yet, the will walk you through the process.
You can use tools like keytool or apksigner to retrieve certificate details, including the SHA-256 hash. Choose whichever is most convenient: get the hash from your signed release APK or directly from your release keystore:
This command will output the certificate details, including the SHA-256 hash, which will look something like this:
You'll need this value for the next step.
Convert the hash to Base64 format, as the SDK requires it in this format. Follow the steps in ➡️
This project is provided as freemium software, i.e. there is a that imposes some limitations on the free usage. The SDK software consists of open-source and binary parts, which is the property of Talsec. The open-source part is licensed under the MIT License - see the file on GitHub for details.
Time spoofing attack is when an attacker (or malicious app) manipulates the device's clock or its time source (e.g. network, GPS, or NTP) to cause system apps to behave incorrectly.
Time spoofing in mobile apps is often used to extend or reuse expired tokens, OTPs, or sessions, bypass trial periods and usage quotas, and skip waiting or cooldown times for time‑restricted features, giving attackers or unauthorised users continued access or unfair advantages.
Below are code snippets demonstrating debugger detection across various platforms:
// Android multi instance check
override fun onTimeSpoofingDetected() {
TODO("Not yet implemented")
}
// Flutter time spoofing detection
onTimeSpoofing: () => print("Multi instance detected")
// Cordova time spoofing detection
timeSpoofing: () => {
// Place your reaction here
}
// React Native time spoofing detection
timeSpoofing: () => {
// Place your reaction here
}
// Capacitor time spoofing detection
timeSpoofing: () => {
// Place your reaction here
}keytool -printcert -jarfile app.apk
// OR:
apksigner verify --print-certs app.apkSHA256: 88:8C:7F:02:D6:2E:ED:3A:53:BB:9C:A6:6B:82:5C:0D:78:A8:E5:B6:B2:11:28:BC:F5:AC:67:C8:E0:A3:7C:5Akeytool -list -v -keystore <path_to_your_keystore_file> -alias <your_alias_name>keytool -list -v -keystore /Users/johndoe/my-release-key.jks -alias my-release-app-aliasiIx/AtYu7TpAu5cma4JdDXio5bayFSi89axnyOCjfFo=echo "88:8C:7F:02:D6:2E:ED:3A:53:BB:9C:A6:6B:82:5C:0D:78:A8:E5:B6:B2:11:28:BC:F5:AC:67:C8:E0:A3:7C:5A" | tr -d ':' | xxd -r -p | base64

Running an application inside an emulator/simulator allows an attacker to hook or trace program execution. For applications running inside an emulator, it is easy to inspect the system's state, reset it to a saved image, or monitor how the app operates. Keep in mind that not every emulator/simulator usage means an ongoing potential threat for the application.
Below are code snippets demonstrating emulator detection across various platforms:
// Android emulator check
override fun onEmulatorDetected() {
TODO("Not yet implemented")
}
// iOS simulator detection
case simulator
// Flutter emulator and simulator detection
onSimulator: () => print("Simulator")
// Cordova emulator and simulator detection
simulator: () => {
// Place your reaction here
}
// React Native emulator and simulator detection
simulator: () => {
// Place your reaction here
}
// Capacitor emulator and simulator detection
simulator: () => {
// Place your reaction here
}This guide provides step-by-step instructions for getting the Base64-encoded signing certificate hash for your Talsec configuration.
All Android apps must be signed with a digital certificate before installation. The signing certificate SHA-256 hash in Base64 form - which we'll refer to as the hash for short, also known as a fingerprint -is the certificate's unique identifier, crucial for security and integrity. The Talsec SDK uses this hash for app tampering detection.
The first step is to determine which app signing method you're using.
If you're using Google Play App Signing, a very common practice for Android App Bundles (AAB) distribution, your upload key and distribution key are distinct. So, be sure to use the app signing certificate key from the Google Play Console. Proceed with the Google Play App Signing Method.
If you're managing your own signing key (Manual App Signing), you'll need to generate the hash yourself from your keystore, proceed with the Manual App Signing Method.
Continue with the method that matches your signing process ➡️
The freeRASP SDK contains public API, so the integration process is as simple as possible. Unfortunately, this public API also creates opportunities for the attacker to interrupt freeRASP SDK operations or modify the custom code in threat callbacks. All internal freeRASP classes are already obfuscated, so it is simple to distinguish freeRASP sources from the rest of the application code during the static analysis. In order for freeRASP to be as effective as possible, it is highly recommended to apply obfuscation to the final package/application, making the public API more difficult to find and also to make it partially randomized for each application so it cannot be automatically abused by generic hooking scripts.
Please follow the integration guide of your platform for more information about how to obfuscate the app.
Below are code snippets demonstrating missing obfuscation detection across various platforms:
// Android
override fun onObfuscationIssuesDetected() {
TODO("Not yet implemented")
}
// Flutter
onObfuscationIssues: () => print("Obfuscation issues")
// Cordova
obfuscationIssues: () => {
// Place your reaction here
},
// React Native
obfuscationIssues: () => {
// Place your reaction here
},
// Capacitor
obfuscationIssues: () => {
// Place your reaction here
},Android developer mode allows deeper system access and debugging capabilities that can bypass app security measures. Developer mode can enable settings that facilitate the installation of uncertified applications and the execution of potentially harmful code, posing significant risks to data integrity and app functionality. FreeRASP detects whether the developer mode is enabled.
Warning: This vulnerability is particularly critical on Android 12 and 13 devices with Developer Mode enabled. A local attacker with ADB shell access can execute arbitrary code within the context of any non-system app, granting them full access to the app’s private data files, AccountManager-stored credentials, and other privileged resources. This bypasses the Application Sandbox’s intended protections, which are designed to isolate app data even from device owners.
Below are code snippets demonstrating developer mode detection across various platforms:
// Android Developer mode detection
override fun onDeveloperModeDetected() {
TODO("Not yet implemented")
}
// Flutter Developer mode detection
onDevMode: () => print("Developer mode detected")
// Cordova Developer mode detection
devMode: () => {
// Place your reaction here
}
// React Native Developer mode detection
devMode: () => {
// Place your reaction here
}
// Capacitor Developer mode detection
devMode: () => {
// Place your reaction here
}A valid business email is your key to the Talsec Portal and the critical security intelligence for your application. This is where your freeRASP data comes to life.
Don't use example or throw-away email. Enter your business email to ensure the Talsec Portal access, security reports, and important product announcements.
We need to ensure that critical security information reaches the right person—or team—responsible for your app.
Invite Your Team: The business email you provide serves as the foundation for your Organization within the Talsec Portal. Once established, you can invite other developers, security analysts, and managers to a centralized dashboard.
Prevent Missed Threats: Imagine a new, widespread attack targeting apps like yours. A throwaway email address means you will miss the security alert, leaving your application and users vulnerable.
Secure Authentication: A valid email is our primary method for verifying your identity & app ownership to ensure that only authorized personnel can access your app's sensitive security data on the Talsec Portal.
It’s Your Professional Identity: We treat you as a professional partner. A business email helps us to establish a proper communication channel with you.
The Secure Enclave and the Android Keystore system make it very difficult to decrypt sensitive data without physical access to the device. In that order, these keys need to be stored securely. freeRASP checks if the keys reside inside secure hardware.
Below are code snippets demonstrating missing hardware detection across various platforms:
// Android Keystore
override fun onHardwareBackedKeystoreNotAvailableDetected() {
TODO("Not yet implemented")
}
// iOS Secure Enclave
case missingSecureEnclave
// Flutter HW backed keystore not available and missing secure enclave detection
onSecureHardwareNotAvailable: () => print("Secure hardware not available")
// Cordova HW backed keystore not available and missing secure enclave detection
secureHardwareNotAvailable: () => {
// Place your reaction here
}
// React Native HW backed keystore not available and missing secure enclave detection
secureHardwareNotAvailable: () => {
// Place your reaction here
}
// Capacitor HW backed keystore not available and missing secure enclave detection
secureHardwareNotAvailable: () => {
// Place your reaction here
}Location spoofing is when an attacker (or malicious app) falsifies the device’s reported location or the location signals it trusts (e.g., GNSS/GPS, Wi‑Fi positioning, cellular location, or IP‑based geolocation), causing the OS and apps to receive incorrect location data.
Location spoofing in mobile apps is commonly used to bypass geofences and region locks, fake presence (e.g., on dating apps or games), create alibis (e.g., on social or parental control apps), or commit location‑based fraud (offers, check‑ins).
Below are code snippets demonstrating debugger detection across various platforms:
// Android location spoofing check
override fun onLocationSpoofingDetected() {
TODO("Not yet implemented")
}
// Flutter location spoofing detection
onLocationSpoofing: () => print("Multi instance detected")
// Cordova location spoofing detection
locationSpoofing: () => {
// Place your reaction here
}
// React Native location spoofing detection
locationSpoofing: () => {
// Place your reaction here
}
// Capacitor location spoofing detection
locationSpoofing: () => {
// Place your reaction here
}While most developers use debuggers to trace the flow of their program during its execution same tool can be attached to an application in an attempt to reverse engineer, check memory values, and steal confidential information. This method looks for specific flags to determine whether the debugger is active and offers the option to disable it.
Below are code snippets demonstrating debugger detection across various platforms:
// Android debugger detection
override fun onDebuggerDetected() {
TODO("Not yet implemented")
}
// iOS debugger detection
case debugger
// Flutter
onDebug: () => print("Debugging")
// Cordova
debug: () => {
// Place your reaction here
}
// React Native
debug: () => {
// Place your reaction here
}
// Capacitor
debug: () => {
// Place your reaction here
}There are two possible values for this flag:
true
Indicates the Release version.
This is the default value when undefined.
false
Indicates the Dev version.
The Dev version of freeRASP is intended for usage during the development phase. It serves the purpose of segregating development and production data, as well as disabling certain checks that are not applicable during the development process. These checks include:
Emulator usage (onSimulator),
Debugging (onDebug),
Signing (onAppIntegrity),
Unofficial store (onUnofficialStore),
Obfuscation issues (onObfuscationIssues),
Developer mode (onDevMode),
ADB Enabled (onADBEnabled).
Integration
Integrate freeRASP for your platform
Security Reports
Learn about regular security reports
License
How is freeRASP licensed
Commercial Subscriptions
Get maximum protection for your app
User Data Policies
Learn how we process your data


expectedPackageName
String
Package name of the app.
"com.talsec.freerasp.demoapp"
expectedSigningCertificateHashBase64
Array<String>
Certificate hashes of your app. You must get your expected signing certificate hashes in Base64 form. You can go through this manual to learn how to sign your app in more detail, including manual signing and using Google's Play app signing.
arrayOf( "mVr/qQLO8DKTwqlL+B1qigl9NoBnbiUs8b4c2Ewcz0k=")
watcherMail
String?
The value is automatically used for Security Reports, Product Updates, and Talsec Portal updates, learn more.
Mail has a strict form '[email protected]'.
supportedAlternativeStores
Array<String>
Package names of the alternative stores on which you are publishing the application. The Google Play Store and Huawei AppGallery, are included internally. (You can assign just emptyArray()). For more information, visit the Detecting Unofficial Installation wiki page.
arrayOf( "com.sec.android.app.samsungapps")
isProd
Boolean?
Defaults to true when undefined. If you want to use the Dev version to make the development process viable, set the parameter to false. Make sure that you have the Release version in the production (i.e. isProd set to true)!. To simplify switching between debug and release version of freeRASP based on the build type, you can use BuildConfig.BUILD_TYPE.contains("Release", true) as a value for isProd.
true
killOnBypass
Boolean?
Defaults to false .
Determines whether the app should be killed within the SDK, if the callbacks are hooked or modified by an attacker.
true




Google manages your app’s signing key and uses it to sign your application.
Watch the video walkthrough or continue with the step-by-step guide below:
To retrieve the SHA-256 hash in Google Play Console, follow these steps:
Open your app and navigate to Test and release > App integrity > Play app signing. Click on "Settings":
Under App signing key certificate, locate the "SHA-256 certificate fingerprint" (fingerprint = hash):
An example SHA-256 hash looks like this:
88:8c:7f:02:d6:2e:ed:3a:53:bb:9c:a6:6b:82:5c:0d:78:a8:e5:b6:b2:11:28:bc:f5:ac:67:c8:e0:a3:7c:5aYou'll need this value for the next step.
Convert the hash to Base64 format, as the SDK requires it in this format. Follow the steps in this section ➡️
Rooting/jailbreaking is a technique of acquiring privileged control over the operating system of an Android/iOS device. While most users root their devices to overcome the limitations put on the devices by the manufacturers, it also enables those with malicious intent to abuse privileged access and steal sensitive information. Many different attack vectors require privileged access to be performed. Tools such as Magisk, Shamiko, Shad0w or Dopamine can hide privileged access and are often used by attackers.
Learn more about the root detection and jailbreak detection.
freeRASP uses various checks to detect whether the device is rooted or jailbroken. It detects not only rooted/jailbroken devices but also looks for the presence of their hiders (e.g., Magisk Hide, Shamiko, Shad0w, Dopamine).
From our data, around 0.5% - 1% of devices have traces of rooting and jailbreaking. Keep that in mind when choosing the appropriate reaction type.
Below are code snippets demonstrating root and jailbreak detection across various platforms:
// Root detection on Android
override fun onRootDetected() {
TODO("Not yet implemented")
}
// iOS jailbreaking detection
case jailbreak
// Flutter root and jailbreak detection
onPrivilegedAccess: () => print("Privileged access")
// Cordova root and jailbreak detection
privilegedAccess: () => {
// Place your reaction here
}
// React Native root and jailbreak detection
privilegedAccess: () => {
// Place your reaction here
}
// Capacitor root and jailbreak detection
privilegedAccess: () => {
// Place your reaction here
}The application can be analysed or modified even though its source code has not been changed, applying a technique known as hooking. This technique can be used to intercept system or application calls and then modify them. An attacker can exploit this by inserting new (often malicious) code or by altering existing one to obtain personal client data. The most well-known hooking frameworks are Frida, Xposed, or Cydia Substrate.
Below are code snippets demonstrating hook detection across various platforms:
// Android hook check
override fun onHookDetected() {
TODO("Not yet implemented")
}
// iOS hook detection
case runtimeManipulation
// Flutter hook and runtime manipulation detection
onHooks: () => print("Hooks")
// Cordova hook and runtime manipulation detection
hooks: () => {
// Place your reaction here
}
// React Native hook and runtime manipulation detection
hooks: () => {
// Place your reaction here
}
// Capacitor hook and runtime manipulation detection
hooks: () => {
// Place your reaction here
}The freeRASP contains so that the integration process is as simple as possible. Unfortunately, this public API also creates opportunities for the attacker to use publicly available information to interrupt freeRASP operations or modify your custom reaction implementation in threat callbacks. In order for freeRASP to be as effective as possible, it is highly recommended to apply obfuscation to the final package/application, making the public API more difficult to find and also partially randomized for each application so it cannot be automatically abused by generic hooking scripts.
The majority of Android projects support code shrinking and obfuscation without any additional need for setup. The owner of the project can define the set of rules that are usually automatically used when the application is built in the release mode. For detailed guidance, explore the official documentation through these links: first reference and second reference.
Explore obfuscation, its types, and Talsec's practical approach—balancing developer experience, app performance, and attack resistance while minimizing drawbacks and ensuring cost-efficient mobile app security:
Description of the freeRASP API
FreeraspConfigSpecifies configuration for your app. See the table below for detailed description of the attributes.
AndroidConfigSpecifies configuration for instances of the app running on Android devices. See the table below for detailed description of the attributes.
IOSConfigSpecifies configuration for instances of the app running on Android devices. See the table below for detailed description of the attributes.
NativeEventEmitterActionsSpecifies a set of callbacks that are used to notify the application when certain security threat is detected.
const startFreeRASP = async (config: FreeraspConfig, reactions: NativeEventEmitterActions): Promise<bool>Method is used to start freeRASP's audit and set up listeners for threats. Returns true when successful.
const removeThreatListeners = (): voidUnregisters threat listeners. Should be called only when the app is being terminated.
const blockScreenCapture = async (enable: boolean): Promise<boolean>const isScreenCaptureBlocked = async (): Promise<boolean>Example:
From GitHub, Copy into your Application folder.
Drag & drop the Talsec folder to your .xcworkspace.
Add TalsecRuntime framework to Target > Build Phases > Link Binary With Libraries.
In the General > Frameworks, Libraries, and Embedded Content choose Embed & Sign.
Note: In case you are using Carthage, the zipped version of the framework is included in the .
To ensure freeRASP functions correctly, you need to provide the necessary configuration. All required values must be filled in for the plugin to operate properly. Use the following template to configure the plugin. Detailed descriptions of the configuration options are provided .
In the AppDelegate import TalsecRuntime and add the following code (e.g., in the didFinishLaunchingWithOptions method.:
You can handle the detected events using handlers. For example, you can log the event, show a window to the user or kill the application. See the to learn more details about the performed checks and their importance for app security.
Anywhere in your project (e.g. in AppDelegate), add the following code as an extension:
Use the code above for handling these types of events:
To utilize active screen shot and screen capture (e.g. mirroring, screen recording) protection, you can use Talsec.blockScreenCapture(enable: Bool, window: UIWindow) with specific UIWindow on which it should be blocked. To receive whether the screen capture is blocked in the specific UIWindow, you can use the Talsec.isScreenCaptureBlocked(in window: UIWindow). For more details about all these screen capture methods, see .
Invoke the following method right after setting up the TalsecConfig in previous steps.
Description of the freeRASP API
TalsecConfigSpecifies configuration for your app. See the table below for detailed description of the attributes.
AndroidConfigSpecifies configuration for instances of the app running on Android devices. See the table below for detailed description of the attributes.
IOSConfigSpecifies configuration for instances of the app running on Android devices. See the table below for detailed description of the attributes.
NativeEventEmitterActionsSpecifies a set of callbacks that are used to notify the application when certain security threat is detected.
const useFreeRasp = (config: TalsecConfig, actions: NativeEventEmitterActions)React Custom Hook responsible for starting freeRASP and setting up listeners
const setThreatListeners = async (config: NativeEventEmitterActions): voidSets up listeners for detected threats
const talsecStart = async (options: TalsecConfig): Promise<string>Method is used to start freeRASP's audit. Returns 'freeRASP started'string when successful.
const removeThreatListeners = async (): voidUnregisters threat listeners. Should be called only when the app is being terminated.
const blockScreenCapture = async (enable: boolean): Promise<string>const isScreenCaptureBlocked = async (): Promise<boolean>This page provides you with all the necessary information about for . Please read it carefully. If you have a question, don't hesitate to .
In this section, you will implement the imported freeRASP Action.
On your app's initial page, navigate to the UI Builder.
On the right panel, click on Actions.
In the Action Flow Editor box, click Open.
In the newly opened window, click on On Page Load at the top.
Click Add Action (or + and then Add Action, if you already have an Action).
On the right panel, search for the runRASP Custom Action.
Select the runRASP Action.
The freeRASP Action requires several arguments to be filled to function. Some data are related to specific platforms.
If you are developing the application exclusively for one platform, you can omit the configuration part related to the other platform. If you don't want to provide configuration to an unrelated platform, provide an empty string:
Click the orange variable icon next to the Value label
Scroll down to Constants
Click Constant to expand the dropdown menu
Select Empty String
watcherMail is an email address designated for receiving security reports. Ensure that the email address follows the strict [email protected] format.
isProd is a boolean flag that determines whether the freeRASP integration is in the Dev or Release version. If you want to learn more about isProd, visit this .
packageName is a unique identifier for your Android application.
You can find the packageName value for your application in FlutterFlow settings:
Navigate to Settings and Integrations.
Locate and select App Details.
In the textbox labelled Package Name, you will find the package name associated with your application.
Do NOT use solutions such as to provide the value of the package name! The package name has to be hardcoded.
signingCertHash is a hash of the certificate of the key which was used to sign the application. The value of the hash must be encoded in Base64 form.
More about signing hash and how to obtain it in .
supportedStore is a third-party app store to which your application is uploaded. By including this store, freeRASP considers it as trusted source.
To add a store, add the package name of the store to the supportedStore list.
bundleId is a unique identifier for your iOS application.
More about bundle ID and how to obtain one: .
teamId is a unique identifier assigned to a development team enrolled in the Apple Developer Program.
You can find your teamId on the Apple Developer portal:
Go to the website: .
Log in using the account that is used to sign and release your app.
Scroll down to the Membership details section.
Look for the line labelled "Team ID" - the value of your team will be displayed there.
The freeRASP Action offers multiple callbacks for handling threats. A callback is an that gets triggered when a threat is detected.
To implement callback:
Open Action Flow Editor with runRASP action.
Open one of the dropdown menus labelled "onX" on the right panel (X for a given type of reaction, for example, onAppIntegrity)
In the Action Flow Editor box, click on Open.
Implement your reaction.
Visit to learn more details about the performed checks and their importance for app security.
freeRASP for Flutter allows you to define multiple values for:
Signing certificate hash
Supported app store
Bundle ID
Due to FlutterFlow's limitations, the current implementation of freeRASP for FlutterFlow only allows you to specify a single value for each of these attributes. If want to provide more values, you can download the code and adjust those parameters manually (see )
Currently, freeRASP supports only Android and iOS. When running the application in the FlutterFlow web client, freeRASP will not be initialized.
The minimum required Android SDK level for freeRASP is 23. FlutterFlow applications have a minimum SDK level of 21 by default.
This creates some restrictions:
Deploying the application from the FlutterFlow web client is not possible.
Downloading the APK from the FlutterFlow web client is not supported.
To overcome these limitations, we recommend following these steps:
Download the code.
Manually raise the SDK level in the build.gradle file to 23.
Deploy the application using Google Play Console.
Raising SDK version
From the root of your project, go to android > app > build.gradle
In defaultConfig update minSdkVersion to at least 23 (Android 6.0) or higher
Check out and register using your watcherMail to see your data. If you integrated the SDK successfully, the application will be present after a few hours. The visualisations will be active later due to the bucketing mechanism.
You have to use the same email for the Portal as you used for the watcherMail parameter.
Device binding is attaching an application instance to a particular mobile device. This method detects a transfer of an application instance to another device. A new install of the application (e.g. in case of buying a new device and transfer the apps) is not detected.
The deviceID detects, whether the has been changed. It is triggered after reinstallation of the application if there are no other applications from the same vendor installed. The value can also change when installing test builds using Xcode or when installing an app on a device using ad-hoc distribution.
Below are code snippets demonstrating device binding detection across various platforms:
Saving any sensitive data on a device without a lock / passcode makes them more prone to theft. With no user authentification device can be accessed and modified with minimal effort. freeRASP checks if the device is secured with any type of lock.
Below are code snippets demonstrating passcode detection across various platforms:
Unsecure Wi‑Fi describes a situation where a device is connected to an open or poorly protected wireless network (for example an open hotspot, weak WPA, or a rogue access point), allowing an attacker to observe, intercept, or alter the device’s traffic and network behavior so the OS and apps communicate over an untrusted link.
Attackers can use unsecured Wi‑Fi to perform man‑in‑the‑middle attacks such as:
Eavesdrop on unencrypted traffic to harvest credentials and session cookies
Hijack or replay active sessions to gain unauthorized access
Present forged or untrusted certificates to perform HTTPS interception
Open network could be considered as safe, if VPN is enabled as well. .
Below are code snippets demonstrating debugger detection across various platforms:
Every application can be easily modified and then resigned by an attacker. This process is known as application repackaging. There may be many reasons for application repackaging, whether it's adding new code, removing app protections, or bypassing app licensing. A modified/tampered application is often distributed using third-party stores or other side channels.
Talsec uses various checks to detect whether the application was tampered (e.g., changed package name, signing hash).
Make sure that you have integrated Talsec correctly (e.g., signing certificate hash). Otherwise, this check might be triggered very often.
Below are code snippets demonstrating app tampering detection across various platforms:
& Fair Usage Policy
Version Number: 1.1
Effective Date: October 13, 2025
This Fair Usage Policy (“Policy”) is incorporated by reference into the Agreement and governs the permitted use of Talsec’s freeRASP (the “Service”) provided by Lynx SFT s.r.o. (“Talsec”, “Provider”, “we”, “us”, or “our”). By utilizing the Service, the Customer (“you”, “your”) agrees to abide by this Policy.
The Service is provided, free of charge, for integration into mobile applications (“Applications”) under the condition that the total cumulative download count across all Applications owned or controlled by the Customer or their organization does not exceed one hundred thousand (100,000) unique devices. For clarity, multiple downloads or updates from the same device are counted as a single download, and the download limit applies collectively to all such Applications per Customer or organization.
Exceeding this threshold constitutes a breach of this Policy and obliges the Customer to transition to a commercial subscription plan.
Talsec reserves the right to reference the Application’s name and logo in Talsec’s marketing communications, including, but not limited to, website sections such as “Trusted by”, presentations, and other promotional materials.
The Service collects and processes security telemetry and threat data. This data is used for product enhancement, operational improvements, and aggregated security insights. By using the Service, you consent to such data collection and processing practices.
No personally identifiable information is intentionally collected or processed.
App publishers should provide clear disclosure to users in compliance with Google Play and Apple App Store policies.
In the event of suspected or actual usage in breach of this Policy (including but not limited to exceeding limits, or interfering with data collection), Talsec may, at its sole discretion and without prejudice to any other remedies:
Suspend or terminate your license to use the Service,
Withhold or discontinue consolidated security reporting or related services,
Require immediate transition to a commercial subscription plan.
Talsec may revise this Policy at any time. Notice of material changes will be provided by publishing the updated Policy on the Service website. Continued use of the Service after posting will constitute acceptance of those changes.
ADB (Android Debug Bridge) Enabled is a power-user feature activated through the "USB Installation" option in the Developer settings. This state can signal potential security risks, such as apps being installed via USB, the device being connected to a man-in-the-middle (MiTM) proxy, or the device running as an emulator. When ADB is enabled, it allows extensive access to the device, including pulling and pushing files, issuing shell commands, working with the activity manager (e.g., starting activities, broadcasting intents, modifying hidden Android settings, attaching a profiler to a process, or making an app debuggable), and managing packages. Additionally, it enables capturing screenshots, recording the screen, and other actions that can compromise app security and user privacy. FreeRASP detects whether the USB debugging is enabled.
Below are code snippets demonstrating ADB enabled detection across various platforms:
Welcome to the freeRASP wiki page!
This page provides additional information about the product. The main goal is to present clear and easily accessible content that will help you better understand freeRASP. We hope you find it helpful and informative.
How to .
Details on .
Information about .
Overview of .
We encourage you to explore the different sections of this wiki to gain a more comprehensive understanding of the freeRASP product and its features. If you have any questions or need further assistance, please feel free to reach out to our support team at [email protected].
Talsec is an academic-based and community-driven mobile security company. We deliver in-App Protection and a User Safety suite for Fintechs. We aim to bridge the gaps between the user's perception of app safety and the strong security requirements of the financial industry.
Talsec offers a wide range of security solutions, such as App and API protection SDK, monitoring services, and the User Safety suite. You can check out the offered products on .
Give us a ⭐:
Follow to stay up to date with the news at Talsec:
Read articles about security issues and their prevention:
Detecting a running VPN service on mobile devices is critical for security-sensitive applications, as it can indicate potential privacy and security risks. VPNs can obscure the user’s actual IP address and route data through servers potentially under external control, which might interfere with geographical restrictions and bypass network security settings intended to protect data integrity and confidentiality. Such anonymising features could be exploited to mask illicit activities, evade compliance controls, or access services from unauthorised regions. FreeRASP checks whether the system VPN is enabled.
Below are code snippets demonstrating system VPN detection across various platforms:
freeRASP performs several security checks to detect potential threats during runtime, each targeting specific attack vectors. Developers and business owners can determine the appropriate response to these incidents, whether by terminating the application, alerting the user, logging the incident details, or choosing to ignore it.
For a detailed explanation of each security check and guidance on selecting an appropriate response, please refer to the individual threat descriptions in the subsections. Remember, the ideal response will depend on your application's specific security needs and use cases.
[Android devices only]
(Keystore/Keychain secure storage check)
[Android devices only]
[Android devices only]
(Screenshot and screen recording detection, block screenshot capture)
[Android devices only]
androidConfig
AndroidConfig?
Configuration for Android apps
any AndroidConfig instance
iosConfig
IOSConfig?
Configuration for iOS apps
any IOSConfig instance
watcherMail
string
The value is automatically used for Security Reports, Product Updates, and Talsec Portal updates, learn more.
Mail has a strict form '[email protected]'.
isProd
boolean?
Defaults to true when undefined. If you want to use the Dev version to make the development process easier, set the parameter to false. Make sure that you have the Release version in the production (i.e. isProd set to true)!. To simplify switching between debug and release version of freeRASP based on the build type, you can use BuildConfig.BUILD_TYPE.contains("Release", true) as a value for isProd.
true
packageName
string
Package name of the app.
'com.talsec.freerasp.demoapp'
certificateHashes
string[]
Certificate hashes of your app.
['mVr/qQLO8DKTwqlL+B1qigl9NoBnbiUs8b4c2Ewcz0k=']
supportedAlternativeStores
string[]
Package names of the alternative stores. If you publish on the Google Play Store and Huawei AppGallery, as these are already included internally. (You can assign just emptyArray()). For more information, visit the Detecting Unofficial Installation wiki page.
[ 'com.sec.android.app.samsungapps']
appBundleId
string
Apple Bundle ID for the app
'com.talsec.freerasp.demoapp'
appTeamId
string
Apple Team ID used in the app
'M8AK35...'
privilegedAccess
() => any
debug
() => any
simulator
() => any
appIntegrity
() => any
unofficialStore
() => any
hooks
() => any
deviceBinding
() => any
deviceID
() => any
passcode
() => any
secureHardwareNotAvailable
() => any
obfuscationIssues
() => any
devMode
() => any
adbEnabled
() => any
systemVPN
() => any
malware
(apps: SuspiciousAppInfo[]) => any
screenshot
() => any
screenRecording
() => any
multiInstance
() => any
androidConfig
AndroidConfig?
Configuration for Android apps
any AndroidConfig instance
iosConfig
IOSConfig?
Configuration for iOS apps
any IOSConfig instance
watcherMail
string
The value is automatically used for Security Reports, Product Updates, and Talsec Portal updates, learn more.
Mail has a strict form '[email protected]'.
isProd
boolean?
Defaults to true when undefined. If you want to use the Dev version to make the development process easier, set the parameter to false. Make sure that you have the Release version in the production (i.e. isProd set to true)!. To simplify switching between debug and release version of freeRASP based on the build type, you can use BuildConfig.BUILD_TYPE.contains("Release", true) as a value for isProd.
true
packageName
string
Package name of the app.
'com.talsec.freerasp.demoapp'
certificateHashes
string[]
Certificate hashes of your app.
['mVr/qQLO8DKTwqlL+B1qigl9NoBnbiUs8b4c2Ewcz0k=']
supportedAlternativeStores
string[]
Package names of the alternative stores. If you publish on the Google Play Store and Huawei AppGallery, as these are already included internally. (You can assign just emptyArray()). For more information, visit the Detecting Unofficial Installation wiki page.
[ 'com.sec.android.app.samsungapps']
appBundleId
string
Apple Bundle ID for the app
'com.talsec.freerasp.demoapp'
appTeamId
string
Apple Team ID used in the app
'M8AK35...'
privilegedAccess
() => any
debug
() => any
simulator
() => any
appIntegrity
() => any
unofficialStore
() => any
hooks
() => any
deviceBinding
() => any
deviceID
() => any
passcode
() => any
secureHardwareNotAvailable
() => any
obfuscationIssues
() => any
devMode
() => any
adbEnabled
() => any
systemVPN
() => any
malware
`(apps: SuspiciousAppInfo[]) => any
screenshot
() => any
screenRecording
() => any
multiInstance
() => any
// Android lock check
override fun onUnlockedDeviceDetected() {
TODO("Not yet implemented")
}
// iOS lock check
case passcode
// Flutter unlocked device and passcode detection
onPasscode: () => print("Passcode not set")
// Cordova unlocked device and passcode detection
passcode: () => {
// Place your reaction here
}
// React Native unlocked device and passcode detection
passcode: () => {
// Place your reaction here
}
// Capacitor unlocked device and passcode detection
passcode: () => {
// Place your reaction here
}// Android tampering
override fun onTamperDetected() {
TODO("Not yet implemented")
}
// iOS signature
case signature
// Flutter tampering and signature detection
onAppIntegrity: () => print("App integrity")
// Cordova tampering and signature detection
appIntegrity: () => {
// Place your reaction here
}
// React Native tampering and signature detection
appIntegrity: () => {
// Place your reaction here
}
// Capacitor tampering and signature detection
appIntegrity: () => {
// Place your reaction here
}// Android ADB enabled detection
override fun onADBEnabledDetected() {
TODO("Not yet implemented")
}
// Flutter ADB enabled detection
onADBEnabled: () => print("Developer mode detected")
// Cordova ADB enabled detection
adbEnabled: () => {
// Place your reaction here
}
// React Native ADB enabled detection
adbEnabled: () => {
// Place your reaction here
}
// Capacitor ADB enabled detection
adbEnabled: () => {
// Place your reaction here
}// Android system VPN detection
override fun onSystemVPNDetected() {
TODO("Not yet implemented")
}
// iOS system VPN detection
case systemVPN
// Flutter system VPN detection
onSystemVPN: () => print("System VPN detected")
// Cordova system VPN detection
systemVPN: () => {
// Place your reaction here
}
// React Native system VPN detection
systemVPN: () => {
// Place your reaction here
}
// Capacitor system VPN detection
systemVPN: () => {
// Place your reaction here
}// Android device binding check
override fun onDeviceBindingDetected() {
TODO("Not yet implemented")
}
// iOS device binding methods
case deviceChange
case deviceID
// Flutter
// device binding and device change detection
onDeviceBinding: () => print("Device binding")
// device ID
onDeviceID: () => print("Device ID") // iOS only
// Cordova
// device binding and device change detection
deviceBinding: () => {
// Place your reaction here
}
// device ID
deviceID: () => { // iOS only
// Place your reaction here
}
// React Native
// device binding and device change detection
deviceBinding: () => {
// Place your reaction here
}
// deviceID
deviceID: () => { // iOS only
// Place your reaction here
}
// Capacitor
// device binding and device change detection
deviceBinding: () => {
// Place your reaction here
}
// deviceID
deviceID: () => { // iOS only
// Place your reaction here
}// Android unsecure wifi check
override fun onUnsecureWifiDetected() {
TODO("Not yet implemented")
}
// Flutter unsecure wifi detection
onUnsecureWifi: () => print("Multi instance detected")
// Cordova unsecure wifi detection
unsecureWifi: () => {
// Place your reaction here
}
// React Native unsecure wifi detection
unsecureWifi: () => {
// Place your reaction here
}
// Capacitor unsecure wifi detection
unsecureWifi: () => {
// Place your reaction here
}android {
...
defaultConfig {
...
minSdkVersion 23
...
}
...
}We would like to reflect on a few performance and telemetry-related topics that emerge occasionally.
Common Questions:
Why does it take too long to finish all the checks?
How to know when all checks are finished?
When are telemetry data transmitted?
Incidents that are triggered during the development (integration & testing) won't happen to a majority of users in the production.
Callbacks can be invoked slower if the freeRASP backend endpoint is overloaded. Data collection takes precedence. However, do not worry; the application will function as intended, and only callbacks might be a little delayed.
freeRASP's threat detection operates asynchronously and continuously. The Talsec.start(...) function merely initiates monitoring; it does not perform a synchronous, one-time scan that returns all results immediately. Actual threat detections are reported over time via callbacks.
freeRASP works smoothly in production, but it may be tricky to understand all the freeRASP concepts during development. During the integration and testing of the freeRASP, you may have observed that it took longer than expected to get results for all threats (callbacks). You want to get results quickly, respond to threats effectively, and ensure there is no noticeable jankiness in the UI interactions.
freeRASP has to do a lot of work once started. The cold boot is a really intensive moment when all detections must be performed, telemetry data transmitted, and callbacks to your app must be delivered (in this order).
Talsec team efforts and community contributions allow freeRASP to improve the performance and security trade-offs continually by tuning the asynchronous processes, network activity, and internal business logic. Like that time when the internal detector ordering was reworked to significantly speed evaluation based on this reported issue and the telemetry insights about the speed of detectors 👌.
Remember the phrase "It is darkest before the dawn"? The integration and testing of freeRASP are inherently accompanied by unintentional threat callbacks invoked by incorrect provisioning of the app's signature (appIntegrity callback), using a simulator for development, an unofficial store (because you haven't published it yet), and others. We've all been there.
It may also seem disconcerting to see that it takes too long until the last expected threat callback invokes. Yet, keep in mind that in production, these incidents won't happen for the genuine unaltered apps run in normal conditions. The performance impact will be negligible. On the contrary, the comfort of a potential attacker and performance degradation in adverse conditions is acceptable.
freeRASP collects security diagnostics data (read more in User Data Policies) in accordance with the Fair Usage Policy. Every detected threat is immediately synchronously logged to a common freeRASP backend. Latencies inflicted by the overload of the endpoint are unfortunate, but we continuously improve and scale as much as possible.
freeRASP is designed to provide continuous, real-time mobile application security by operating asynchronously in the background. Unlike traditional security scans that might perform a one-time check and deliver all results synchronously, freeRASP constantly monitors for potential threats. When you call Talsec.start(...), it does not execute an immediate, comprehensive scan that finishes and returns a full snapshot of your app's security status. Instead, this function simply initiates the monitoring service, allowing freeRASP to begin its ongoing vigilance.
Due to this asynchronous nature, any immediate attempt to retrieve the security status after Talsec.start(...) is called will likely yield an outdated result. Threat detections happen over time, in the background, and freeRASP communicates these detections through callbacks. These callbacks are functions you define that get triggered when a specific threat (such as a debugger being attached or a screenshot detected) is identified. It is these callbacks that are responsible for updating your application's understanding of the current security state.
It takes some time for freeRASP to actually detect threats and trigger its corresponding callbacks to report them, the callback solution provided for all freeRASP flavors ensures an accurate reflection of freeRASP's ongoing, dynamic threat detections.
let config = TalsecConfig(
appBundleIds: ["YOUR_APP_BUNDLE_ID"],
appTeamId: "YOUR TEAM ID",
watcherMailAddress: "[email protected]",
isProd: true
)import TalsecRuntime
extension SecurityThreatCenter: SecurityThreatHandler {
public func threatDetected(_ securityThreat: TalsecRuntime.SecurityThreat) {
print("Found incident: \(securityThreat.rawValue)")
}
}public enum SecurityThreat: String, Codable, CaseIterable, Equatable {
/// app integrity / repackaging / tampering
case = "appIntegrity"
/// jailbreak
case = "privilegedAccess"
/// debugger
case = "debug"
/// runtime manipulation / hooks
case = "hooks"
/// disabled passcode
case
/// [DEPRECATED] passcode change
case passcodeChange
/// simulator
case
/// missing Secure Enclave
case
/// device binding
case = "device binding"
/// changed deviceID
case
/// unofficial store or Xcode build
case
/// Detected system VPN
case
/// screenshot
case
/// screen recording and screen mirroring
case
}...
let config = TalsecConfig(...)
Talsec.start(config: config)

Description of the freeRASP API
TalsecConfigSpecifies configuration for your app. See the table below for detailed description of the attributes.
androidConfig
AndroidConfig?
Configuration for Android apps
any AndroidConfig instance
iosConfig
IOSConfig?
Configuration for iOS apps
any IOSConfig instance
watcherMail
string
The value is automatically used for Security Reports, Product Updates, and Talsec Portal updates, .
Mail has a strict form '[email protected]'.
isProd
boolean?
Defaults to true when undefined. If you want to use the Dev version to make the development process easier, set the parameter to false. Make sure that you have the Release version in the production (i.e. isProd set to true)!. To simplify switching between debug and release version of freeRASP based on the build type, you can use BuildConfig.BUILD_TYPE.contains("Release", true) as a value for isProd.
true
AndroidConfigSpecifies configuration for instances of the app running on Android devices. See the table below for detailed description of the attributes.
packageName
string
Package name of the app.
'com.talsec.freerasp.demoapp'
certificateHashes
string[]
Certificate hashes of your app.
['mVr/qQLO8DKTwqlL+B1qigl9NoBnbiUs8b4c2Ewcz0k=']
supportedAlternativeStores
string[]
Package names of the alternative stores. If you publish on the Google Play Store and Huawei AppGallery, as these are already included internally. (You can assign just emptyArray()). For more information, visit the wiki page.
[ 'com.sec.android.app.samsungapps']
IOSConfigSpecifies configuration for instances of the app running on Android devices. See the table below for detailed description of the attributes.
appBundleId
string
Apple Bundle ID for the app
'com.talsec.freerasp.demoapp'
appTeamId
string
Apple Team ID used in the app
'M8AK35...'
NativeEventEmitterActionsSpecifies a set of callbacks that are used to notify the application when certain security threat is detected.
privilegedAccess
() => any
debug
() => any
simulator
() => any
appIntegrity
() => any
unofficialStore
() => any
hooks
() => any
deviceBinding
() => any
deviceID
() => any
passcode
() => any
secureHardwareNotAvailable
() => any
obfuscationIssues
() => any
devMode
() => any
adbEnabled
() => any
systemVPN
() => any
malware
(apps: SuspiciousAppInfo[]) => any
screenshot
() => any
screenRecording
() => any
multiInstance
() => any
const start = async (config: FreeraspConfig, eventListenerConfig: NativeEventEmitterActions): Promise<void>Method is used to start freeRASP's audit and set up listeners for threats.
const blockScreenCapture = async (enable: boolean): Promise<string>const isScreenCaptureBlocked = async (): Promise<boolean>At Talsec, our commitment goes beyond just providing strong security solutions. We believe in continuously evolving our offerings by actively listening to community feedback and responding to the unique needs of developers. Our goal is not only to protect your applications but also to ensure that your insights and experiences shape our products.
We value your input because we understand that secure and effective development tooling is built through collaboration. Your voice, as a developer, is crucial to making our solutions more robust, dev-friendly, and aligned with real-world challenges.
We strive to deliver a flawless experience with our software. However, despite our best efforts, occasional bugs or issues may still arise. If you encounter any problems or notice anything that seems out of place, we encourage you to let us know.
If you have ideas that could enhance freeRASP or improve your developer experience, we want to hear from you. We value suggestions from the community, as they reflect real needs and practical experiences.
To share your idea, please open an enhancement issue on our GitHub repository. Your input helps us prioritize features and improvements that matter most to our users.
We recognize that some ideas are already on our radar and are actively under consideration. To keep track of proposed enhancements and their progress, we use GitHub Projects.
Before submitting a new idea, we recommend reviewing our GitHub Projects board. This will help you see if your suggestion is already being worked on or if similar ideas have been proposed.
Are you looking for upcoming events, ways to engage on social media, or a quick overview of our key programs? This is the hub of our community! Visit the main go-to resource for staying connected with Talsec.
Multi-instance refers to the ability to launch multiple instances of the same application—either intentionally (such as through app cloning or multi-user modes) or unintentionally (due to a malicious attack or system bug). Each instance may run in a separate process, which can lead to security, privacy, or data consistency issues—especially in sensitive applications like finance, messaging, or enterprise tools.
Currently, detection of multi-instance using Parallel Space is supported.
Below are code snippets demonstrating passcode detection across various platforms:
// Android multi instance check
override fun onMultiInstanceDetected() {
TODO("Not yet implemented")
}
// Flutter multi instance detection
onMultiInstance: () => print("Multi instance detected")
// Cordova multi instance detection
multiInstance: () => {
// Place your reaction here
}
// React Native multi instance detection
multiInstance: () => {
// Place your reaction here
}
// Capacitor multi instance detection
multiInstance: () => {
// Place your reaction here
}What is multi-instacing, why is it an issue and how to detect it?
🚩 Raise GitHub Issue
Let us and the community know your struggles.
📧 Write Mail
If you prefer private consultation.
🗳️ Raise GitHub Enhancement Issue
Missing some feature? Let us know!
⚖️ GitHub Project Board
Explore ideas we plan to refine and implement.
Community [Apply to Join!]

Description of the freeRASP API
TalsecConfigSpecifies configuration for your app. See the table below for detailed description of the attributes.
androidConfig
AndroidConfig?
Configuration for Android apps
any AndroidConfig instance
iosConfig
IOSConfig?
Configuration for iOS apps
any IOSConfig instance
watcherMail
String
The value is automatically used for Security Reports, Product Updates, and Talsec Portal updates, .
Mail has a strict form '[email protected]'.
isProd
bool?
Defaults to true when undefined. If you want to use the Dev version to make the development process easier, set the parameter to false. Make sure that you have the Release version in the production (i.e. isProd set to true)!. To simplify switching between debug and release version of freeRASP based on the build type, you can use BuildConfig.BUILD_TYPE.contains("Release", true) as a value for isProd.
true
killOnBypass
bool?
Defaults to false .
Determines whether the app should be killed within the SDK, if the callbacks are hooked or modified by an attacker.
true
AndroidConfigSpecifies configuration for instances of the app running on Android devices. See the table below for detailed description of the attributes.
packageName
String
Package name of the app.
'com.talsec.freerasp.demoapp'
signingCertHashes
List<String>
Certificate hashes of your app.
['mVr/qQLO8DKTwqlL+B1qigl9NoBnbiUs8b4c2Ewcz0k=']
supportedStores
List<String>
Package names of the alternative stores. If you publish on the Google Play Store and Huawei AppGallery, as these are already included internally. (You can assign just emptyArray()). For more information, visit the wiki page.
'com.sec.android.app.samsungapps']
IOSConfigSpecifies configuration for instances of the app running on Android devices. See the table below for detailed description of the attributes.
bundleIds
List<String>
List of Bundle IDs for the app
com.talsec.freerasp.demoapp']
teamId
String
Apple Team ID used in the app
'M8AK35...'
Future<void> start(TalsecConfig config)Starts freeRASP with configuration provided in config.
void attachListener(ThreatCallback callback)Attaches instance of ThreatCallback to freeRASP. If ThreatCallback is already attached, current one will be detached and replaced with callback. When threat is detected, respective callback of ThreatCallback is invoked.
ThreatCallbackA class which represents a set of callbacks that are used to notify the application when certain security threat is detected. Read more about the meaning of the callbacks in the wiki.
onPrivilegedAccess
VoidCallback?
onDebug
VoidCallback?
onSimulator
VoidCallback?
onAppIntegrity
VoidCallback?
onUnofficialStore
VoidCallback?
onHooks
VoidCallback?
onDeviceBinding
VoidCallback?
onDeviceID
VoidCallback?
onPasscode
VoidCallback?
onSecureHardwareNotAvailable
VoidCallback?
onObfuscationIssues
VoidCallback?
onDevMode
VoidCallback?
onADBEnabled
VoidCallback?
onSystemVPN
VoidCallback?
onMultiInstance
VoidCallback?
onUnsecureWifi
VoidCallback?
onTimeSpoofing
VoidCallback?
onLocationSpoofing
VoidCallback?
void onMalwareDetected( List<SuspiciousAppInfo> suspiciousApps)
MalwareCallback?
RaspExecutionStateCallbackA class which represents a set of callbacks that are used to notify the application when state of executing RASP checks changes.
onAllChecksDone
VoidCallback?
Screenshot detection identifies when a screenshot is taken on a device. Screenshots can expose sensitive app data, such as user credentials, personal content, or confidential information, leading to privacy and security risks. By detecting screenshots, apps can take preventive measures, such as:
Obscuring sensitive content before the screenshot is captured.
Notifying users that a screenshot has been taken.
Logging events for security monitoring and analysis.
// Android screenshot detection
override fun onScreenshotDetected() {
TODO("Not yet implemented")
}
// iOS screenshot detection
case screenshot
// Flutter screenshot detection
onScreenshot: () => print("Screenshot capture detected")
// React Native, Capacitor and Cordova
screenshot: () => {
console.log('screenshot');
},Screen recording detection helps identify when a device's screen is being recorded. Screen recordings can capture sensitive data, such as user interactions and proprietary app content. By detecting screen recordings, apps can:
Mask sensitive information during recording.
Alert users that their screen is being recorded.
Log events for further security analysis.
// Android screen recording detection
override fun onScreenRecordingDetected() {
TODO("Not yet implemented")
}
// iOS screen recording and screen mirrorring (AirPlay) detection
case screenRecording
// Flutter screen recording detection and screen mirrorring detection
onScreenRecording: () => print("Screen recording detected")
// React Native, Capacitor and Cordova
screenRecording: () => {
console.log('screenRecording');
},Screen capture protection prevents your app’s content from appearing in screenshots and screen recordings. When enabled, captured images and recordings display a black screen, protecting sensitive information.
To enable or disable protection dynamically, pass true or false.
// Android screen capture protection
Talsec.blockScreenCapture(activity, true)
// iOS screen capture protection
Talsec.blockScreenCapture(enable: true, window: UIWindow)
// Flutter screen capture protection
await Talsec.instance.blockScreenCapture(enabled: true)
// React Native
import { blockScreenCapture } from 'freerasp-react-native';
await blockScreenCapture(true);
// response: Screen capture is now Blocked
// Capacitor
import { blockScreenCapture } from 'capacitor-freerasp';
await blockScreenCapture(true);
// response: true
// Cordova
await talsec.blockScreenCapture(true);
// response: Screen capture is now BlockedTo check whether screen capture is currently blocked in the application, use the following method:
// Android screen capture state
Talsec.isScreenCaptureBlocked()
// iOS screen capture state
Talsec.isScreenCaptureBlocked(in window: UIWindow)
// Flutter screen capture state
await Talsec.instance.isScreenCaptureBlocked()
// React Native
import { isScreenCaptureBlocked } from 'freerasp-react-native';
const response = await isScreenCaptureBlocked();
// response: true
// Capacitor
import { isScreenCaptureBlocked } from 'capacitor-freerasp';
const response = await isScreenCaptureBlocked();
//response: true
// Cordova
const response = await talsec.isScreenCaptureBlocked();
//response: trueIn our article we explain how to block screenshots, screen recording, and remote access tools in mobile apps to protect user data. It discusses security threats such as built-in screenshot tools, remote desktop apps like TeamViewer, screen mirroring software, third-party recording apps, and ADB-based access.
Information about collected data
freeRASP collects anonymized security diagnostics data from apps. These data contain:
Application state and security.
Device state and security.
Anonymous app instance ID and device ID.
This information allows Talsec to provide a security report, improve the freeRASP product and even the commercial RASP SDK, or prepare mobile security reports and articles.
All the data collected by the freeRASP is technical diagnostics information and anonymous, but depending on the regulations applied, it could be considered sensitive and/or personal data.
Talsec recommends adding the statement below to the dedicated privacy policy page of your app. You can also use the text below while filling in the Google Play Safety Section or similar for Apple App Store publishing.
Google Play requires all app publishers to declare how they collect and handle user data for the apps they publish on Google Play. They should inform users properly of the data collected by the apps and how the data is shared and processed. Google will reject the apps which do not comply with the policy.
The checks for the Google Play and details about data are specified above in #Privacy Policy Statement.
Apple requires that all app developers disclose their data collection and handling practices for apps published on the App Store. Developers must clearly inform users about the data their apps collect, as well as how this data is shared and processed. Apps that do not adhere to Apple's data privacy guidelines will be rejected.
To comply with the policy, in the App Privacy section, it is important to check the following:
Identifiers -> Device ID -> App Functionality
It is an anonymous device identifier for the App vendor as per: https://developer.apple.com/documentation/uikit/uidevice/1620059-identifierforvendor
Talsec Security SDK can not link the device identifier to the user
Diagnostics -> Performance Data -> App Functionality, Other Purposes, No for linking to the user
Diagnostics -> Other diagnostics data -> App Functionality, Other Purposes, No for linking to the user
Other data -> App Functionality, No for linking to the user
Security diagnostics data (such as jailbreak)
Google Play’s User Data policy indicates that a prominent disclosure should be presented to the users in case of an app collecting personal or sensitive data.
Although freeRASP collects diagnostical data (anonymous and not user-related), you (as the app publisher) should consider adding a disclosure screen, describing why the security diagnostic data is needed, what data, and how the data is used.
🚨 freeRASP for Unity – Early Release [6/2025]
We’re excited to introduce freeRASP for Unity as a new flavor of our runtime protection library. As it’s still fresh, you may encounter some integration issues that need to be ironed out.
We’d love to hear about your experience—good or bad. Please or write us directly at [email protected]. Your feedback helps us make it better!
Example:
The freeRASP has the following prerequisites that must be met before starting:
Unity Editor level: 6 or higher
Minimum SDK level: 23 or higher
First, you'll need to install freeRASP for Unity. Head over to [] and download the latest plugin. The plugin file should have a .unitypackage extension.
Next, import the plugin into your Unity project: right-click on Assets → Import Package → Custom Package.
To ensure freeRASP works properly, you need to configure and initialize it with the required settings. All necessary values must be provided for the plugin to function correctly. Detailed explanations of each configuration option are available on the .
The first step involves obtaining your app's signing certificate hashes in Base64 format. Refer to the provided for comprehensive guidance on app signing, which covers both manual signing methods and Google Play's app signing service.
In this guide, we'll create the Game.cs script (see our ) attached to a GameObject to initialize freeRASP and configure reactions. You can use any other scripts in your business logic that are initiated when the app starts.
To make your Game.cs script run, you need to attach it to a GameObject in your Scene (drag'n'drop the Game.cs onto some object):
Create an empty GameObject in your scene (or select an existing one).
Drag your Game.cs script from the Project window onto that GameObject in the Hierarchy window or the Inspector window.
When you run the scene, the Start() and Update() methods (and others) of your Game.cs script will be called on that GameObject.
In the Game.cs (or your app’s entry point), import freeRASP and add the following code:
To receive threat notifications, implement the AndroidThreatDetectedCallback interface. It contains multiple methods that are triggered when freeRASP periodically scans the device for security threats. Implement these methods within your game logic or main application class.
To ensure freeRASP works properly, you need to configure and initialize it with the required settings. All necessary values must be provided for the plugin to function correctly. Detailed explanations of each configuration option are available on the .
To make your Game.cs script run, you need to attach it to a GameObject in your Scene (drag'n'drop the Game.cs onto some object):
Create an empty GameObject in your scene (or select an existing one).
Drag your Game.cs script from the Project window onto that GameObject in the Hierarchy window or the Inspector window.
When you run the scene, the Start() and Update() methods (and others) of your Game.cs script will be called on that GameObject.
In your app’s entry point, import freeRASP and add the following code:
To receive threat notifications, implement the IOSThreatDetectedCallback interface. It contains multiple methods that are triggered when freeRASP periodically scans the device for security threats. Implement these methods within your game logic or main application class.
Once you are done with your game in Unity Hub; proceed to export the project. Once exported, open up the project in Xcode and add freeRASP dependency:
From GitHub, Copy Talsec folder into your Application folder.
(select v6.11.0: )
Drag & drop the Talsec folder to your .xcworkspace.
Add TalsecRuntime framework to Target > Build Phases > Link Binary With Libraries.
In the General > Frameworks, Libraries, and Embedded Content choose Embed & Sign.
Note: In case you are using Carthage, the zipped version of the framework is included in the GitHub Releases ().
🚨 freeRASP for Unreal Engine – Early Release [10/2025]
We’re excited to introduce freeRASP for Unreal Engine as a new flavor of our runtime protection library. As it’s still fresh, you may encounter some integration issues that need to be ironed out.
We’d love to hear about your experience—good or bad. Please or write us directly at [email protected]. Your feedback helps us make it better!
The freeRASP has the following prerequisites that must be met before starting:
Supported Unreal Engine Versions: 5.1 or higher
Minimum Android Target SDK: API Level 23
Minimum iOS Deployment Target: 15.0
To install the plugin, download the latest release from the Releases page on GitHub.
Navigate to the on the GitHub repository.
Under the latest release (e.g., 0.1.0), find the Assets section.
Download the .zip or .tar.gz file, for example, Free-RASP-UnrealEngine-POC-0.1.0.zip.
Extract the archive. Inside you will find the FreeRASPPlugin folder.
Copy the entire FreeRASPPlugin directory into your project's Plugins folder. If a Plugins folder doesn't exist at the root of your project, you will need to create it first.
The correct final directory structure should look like this:
To complete the installation, please restart the Unreal Editor to allow it to detect the new plugin.
Enabling the plugin involves two steps: enabling it in the editor and verifying the dependency in the C++ build file.
In the main Unreal Engine menu, navigate to Edit -> Plugins.
In the left panel, find the Project -> Security category.
Locate the FreeRASP plugin and ensure the Enabled checkbox is checked.
Open your project's build configuration file, named <project_name>.Build.cs. Verify that the module name FreeRASPPlugin is added to the PublicDependencyModuleNames list.
It should look similar to this example:
With the plugin installed and enabled, it's time to write the code to initialize freeRASP and handle its threat notifications. This process involves preparing a C++ class, initializing the plugin at startup, and implementing a function to handle threats.
First you need to prepare a class to receive threat notifications. The recommended place for this is your APlayerController class, as it persists for the entire game session.
In your class's header file (.h), include the plugin's header and define the function that will act as the callback.
Example AFreeRASPPlayerController.h:
Initialization should occur as early as possible when the game starts. The BeginPlay() method is the ideal place for this. Here, you will connect your HandleSecurityThreat function and set the configuration parameters for freeRASP.
Detailed explanations of each configuration option are available on the and pages.
Configuration Options: AppBundleIds, AppTeamId, PackageName, SigningCertificates, AlternativeStores, WatcherEmail and IsProduction
Example MyPlayerController.cpp:
Finally, implement the logic for the HandleSecurityThreat function itself. This part of the code decides what happens when a specific threat is detected.
Example FreeRASPPlayerController.cpp:
Users can share a copy of the application on unofficial stores or various pirate forums. While some users download these copies to avoid paying for the product, they can include unknown and possibly dangerous modifications. Verifying an official installation consequently protects both the users and the owner. This reaction is also triggered, if you install the application through alternative ways like unofficial store or Xcode build.
Below are code snippets demonstrating detection of unofficial installation across various platforms:
If you want to define which applications can install the application, insert its package name in the supportedAlternativeStores (or supportedStores on Flutter) parameter. If you publish on Google Play, Huawei AppGallery, App Store (iOS), and TestFlight (iOS), you don't need to assign anything, as they are already supported out of the box.
The application can also be installed by "cloning" apps, which users employ to transfer apps between devices. The following list comprises popular examples of such apps. By default, freeRASP categorizes them as installations from an unofficial store .
Finally, it's very common application gets installed through browser, file manager, cloud storage or various messaging apps. By default, freeRASP categorizes them as installations from unofficial store.
Check out and register using your to see your data. If you integrated the SDK successfully, the application will be present after a few hours. The visualisations will be active later due to the bucketing mechanism.
You have to use the same email for the Portal as you used for the watcherMail parameter.
// Android
override fun onUntrustedInstallationSourceDetected() {...}
// iOS
case unofficialStore
// Flutter
onUnofficialStore: () => print("Unofficial store")
// Cordova
unofficialStore: () => {
// Place your reaction here
}
// React Native
unofficialStore: () => {
// Place your reaction here
}
// Capacitor
unofficialStore: () => {
// Place your reaction here
}App Store (iOS)
Included by default, no action needed
TestFlight (iOS)
Included by default, no action needed
Google Play
Included by default, no action needed
Huawei AppGallery
Included by default, no action needed
Firebase App Distribution
dev.firebase.appdistribution
Samsung Galaxy Store
com.sec.android.app.samsungapps
Common on Samsung devices
Vivo App Store
com.vivo.appstore
Common on Vivo devices
HeyTap
com.heytap.market
Common on Realme and Oppo devices
Oppo App Market
com.oppo.market
Common on Oppo devices
GetApps
com.xiaomi.mipicks
Common on Xiaomi, Redmi and POCO devices
Mi Mover (Xiaomi)
com.miui.huanji
Phone Clone (Huawei)
com.hicloud.android.clone
Samsung Smart Switch
com.sec.android.easyMover
Samsung Cloud for Wear OS
com.samsung.android.scloud
OPPO Clone Phone
com.coloros.backuprestore
EasyShare (Vivo)
com.vivo.easyshare
Clone Phone (OnePlus)
com.oneplus.backuprestore
SHAREit (Lenovo)
com.lenovo.anyshare.gps
SHAREit Lite
shareit.lite
ShareMe (Xiaomi)
com.xiaomi.midrop
MIUI Backup (Xiaomi)
com.miui.backup
Phone Clone (Honor)
com.hihonor.android.clone
[YourProjectName]/
├── Content/
├── Source/
├── Plugins/ <-- Create if missing
│ └── FreeRASPPlugin/
└── YourProjectName.uprojectusing UnrealBuildTool;
public class freeRASP4 : ModuleRules
{
public freeRASP4 (ReadOnlyTargetRules Target) : base(Target)
{
PCHUsage = PCHUsageMode.UseExplicitOrSharedPCHs;
PublicDependencyModuleNames.AddRange(new string[] {
"Core",
"CoreUObject",
"Engine",
"InputCore",
"EnhancedInput",
"AIModule",
"StateTreeModule",
"GameplayStateTreeModule",
"UMG",
"FreeRASPPlugin" // <-- check if this line is added
});
}
}#pragma once
#include "CoreMinimal.h"
#include "GameFramework/PlayerController.h"
#include "FreeRASPPluginLibrary.h" // <-- 1. Include the header file
#include "FreeRASPPlayerController.generated.h"
/**
* Basic PlayerController class for a game
*/
UCLASS(abstract)
class AFreeRASPPlayerController : public APlayerController
{
GENERATED_BODY()
protected:
/** Input Mapping Contexts */
UPROPERTY(EditAnywhere, BlueprintReadOnly, Category = "Input", meta = (AllowPrivateAccess = "true"))
TArray<UInputMappingContext*> DefaultMappingContexts;
/** Input mapping context setup */
virtual void SetupInputComponent() override;
virtual void BeginPlay() override; // initialize FreeRASP here
UFUNCTION()
void HandleSecurityThreat(ThreatType ThreatType); // define this method to receive threat callbacks
};#include "AFreeRASPPlayerController.h" // Include your header file
#include "FreeRASPPluginLibrary.h" // Include the plugin header
void AFreeRASPPlayerController::BeginPlay()
{
Super::BeginPlay();
// Get the FreeRASP plugin library instance
if (UFreeRASPPluginLibrary* FreeRASPLib = GetGame->GetSubsystem<UFreeRASPPluginLibrary>())
{
// 1. Bind your function to the threat detection event
// The class name here MUST match the class you are in (e.g., AMyPlayerController)
FreeRASPLib->OnSecurityThreatDetected.AddDynamic(this, &AFreeRASPPlayerController::HandleSecurityThreat);
// 2. Prepare the configuration
// Important: These values are placeholders. Replace them with your actual data.
// iOS Configuration
TArray<FString> AppBundleIds;
AppBundleIds.Add(TEXT("com.game.bundle.id"));
FString AppTeamId = TEXT("1AB2C3");
// Android Configuration
FString PackageName = TEXT("com.talsec.free.rasp.game");
TArray<FString> SigningCertificates;
SigningCertificates.Add(TEXT("ilx/AtYu7TpAu5cma4JdDXio5bayFSi89axnyOCjfFo="));
TArray<FString> AlternativeStores;
AlternativeStores.Add(TEXT("com.samsung.android.apps.galaxyapp"));
// General Configuration
FString WatcherEmail = TEXT("[email protected]");
bool IsProduction = true; // Set to false for development builds
// 3. Initialize freeRASP
FreeRASPLib->InitializeTalsec(
AppBundleIds,
AppTeamId,
PackageName,
SigningCertificates,
AlternativeStores,
WatcherEmail,
IsProduction
);
}
}void AFreeRASPPlayerController::HandleSecurityThreat(ThreatType ThreatType)
{
UE_LOG(LogTemp, Warning, TEXT("Security threat detected: %d"), ThreatType);
switch (ThreatType) {
case ThreatType::OnPrivilegedAccess:
UE_LOG(LogTemp, Warning, TEXT("Privileged access threat detected"));
break;
case ThreatType::OnAppIntegrity:
UE_LOG(LogTemp, Warning, TEXT("App integrity threat detected"));
break;
case ThreatType::OnDebug:
UE_LOG(LogTemp, Warning, TEXT("Debug threat detected"));
break;
case ThreatType::OnSimulator:
UE_LOG(LogTemp, Warning, TEXT("Simulator threat detected"));
break;
case ThreatType::OnUnofficialStore:
UE_LOG(LogTemp, Warning, TEXT("Unofficial store threat detected"));
break;
case ThreatType::OnHookDetected:
UE_LOG(LogTemp, Warning, TEXT("Hook threat detected"));
break;
case ThreatType::OnDeviceBinding:
UE_LOG(LogTemp, Warning, TEXT("Device binding threat detected"));
break;
case ThreatType::OnDeviceID:
UE_LOG(LogTemp, Warning, TEXT("Device ID threat detected"));
break;
case ThreatType::OnObfuscationIssues:
UE_LOG(LogTemp, Warning, TEXT("Obfuscation issues threat detected"));
break;
case ThreatType::OnScreenshot:
UE_LOG(LogTemp, Warning, TEXT("Screenshot threat detected"));
break;
case ThreatType::OnScreenRecording:
UE_LOG(LogTemp, Warning, TEXT("Screen recording threat detected"));
break;
case ThreatType::OnPasscode:
UE_LOG(LogTemp, Warning, TEXT("Passcode threat detected"));
break;
case ThreatType::OnPasscodeChange:
UE_LOG(LogTemp, Warning, TEXT("Passcode change threat detected"));
break;
case ThreatType::OnSecureHardwareNotAvailable:
UE_LOG(LogTemp, Warning, TEXT("Secure hardware not available threat detected"));
break;
case ThreatType::OnDevMode:
UE_LOG(LogTemp, Warning, TEXT("Dev mode threat detected"));
break;
case ThreatType::OnADBEnabled:
UE_LOG(LogTemp, Warning, TEXT("ADB enabled threat detected"));
break;
case ThreatType::OnSystemVPN:
UE_log(LogTemp, Warning, TEXT("System VPN threat detected"));
break;
case ThreatType::Unknown:
UE_LOG(LogTemp, Warning, TEXT("Unknown threat detected"));
break
}
}
Check out Data Visualisation Portal and register using your watcherMail to see your data. If you integrated the SDK successfully, the application will be present after a few hours. The visualisations will be active later due to the bucketing mechanism.
You have to use the same email for the Portal as you used for the watcherMail parameter.

using UnityEngine;
public class Game : MonoBehaviour
{
// Start is called once before the first execution of Update after the MonoBehaviour is created
void Start()
{
bool isProd = true;
string watcherMailAddress = "[email protected]";
// Android related configs
string expectedPackageName = "com.unity.rasp.game";
string[] expectedSigningCertificateHashBase64 = new string[] { "Tmac/QIomCqEGS1jYqy9cMMrqaitVoZLpjXzCMnt55Q=" };
string[] supportedAlternativeStores = new string[] { "com.sec.android.app.samsungapps" };
// initialize talsec
TalsecPlugin.Instance.initAndroidTalsec(expectedPackageName, expectedSigningCertificateHashBase64,
supportedAlternativeStores, watcherMailAddress, isProd);
TalsecPlugin.Instance.setAndroidCallback(this); // set Android callback
}
// Update is called once per frame
void Update()
{
}
}// Implementation of AndroidThreatDetectedCallback interface
public void onRootDetected()
{
Debug.Log("Unity - Root detected");
}
public void onTamperDetected()
{
Debug.Log("Unity - Tamper detected");
}
public void onDebuggerDetected()
{
Debug.Log("Unity - Debugger detected");
}
public void onEmulatorDetected()
{
Debug.Log("Unity - Emulator detected");
}
public void onObfuscationIssuesDetected()
{
Debug.Log("Unity - Obfuscation issues detected");
}
public void onScreenshotDetected()
{
Debug.Log("Unity - Screenshot detected");
}
public void onScreenRecordingDetected()
{
Debug.Log("Unity - Screen recording detected");
}
public void onUntrustedInstallationSourceDetected() {
Debug.Log("Unity - Untrusted installation source detected");
}
public void onHookDetected() {
Debug.Log("Unity - Hook detected");
}
public void onDeviceBindingDetected() {
Debug.Log("Unity - Device binding detected");
}
public void onUnlockedDeviceDetected() {
Debug.Log("Unity - Unlocked device detected");
}
public void onHardwareBackedKeystoreNotAvailableDetected() {
Debug.Log("Unity - Hardware backed keystore not available detected");
}
public void onDeveloperModeDetected() {
Debug.Log("Unity - Developer mode detected");
}
public void onADBEnabledDetected() {
Debug.Log("Unity - ADB enabled detected");
}
public void onSystemVPNDetected() {
Debug.Log("Unity - System VPN detected");
}dependencyResolutionManagement {
repositoriesMode.set(RepositoriesMode.PREFER_SETTINGS)
repositories {
google()
mavenCentral()
maven { url 'https://jitpack.io' }
maven { url 'https://europe-west3-maven.pkg.dev/talsec-artifact-repository/freerasp' }
flatDir {
dirs "${project(':unityLibrary').projectDir}/libs"
}
}
}
using System;
using UnityEngine;
using System.Collections;
using System.Collections.Generic;
public class Game : MonoBehaviour
{
// Start is called once before the first execution of Update after the MonoBehaviour is created
void Start()
{
// common configs
bool isProd = true;
string watcherMailAddress = "[email protected]";
// iOS related configs
string[] appBundleIds = new string[] { "com.unity.freeRASP" };
string teamId = "TEAM ID";
// initialize talsec
TalsecPlugin.Instance.initiOSTalsec(appBundleIds, teamId, watcherMailAddress, isProd);
TalsecPlugin.Instance.setiOSCallback(this); // set callback
}
}// Implementation of IOSThreatDetectedCallback interface
public void signatureDetected() {
Debug.Log("Signature detected");
}
public void jailbreakDetected() {
Debug.Log("Jailbreak detected");
}
public void debuggerDetected() {
Debug.Log("Debugger detected");
}
public void runtimeManipulationDetected() {
Debug.Log("Runtime manipulation detected");
}
public void passcodeDetected() {
Debug.Log("Passcode detected");
}
public void passcodeChangeDetected() {
Debug.Log("Passcode change detected");
}
public void simulatorDetected() {
Debug.Log("Simulator detected");
}
public void missingSecureEnclaveDetected() {
Debug.Log("Unity - Missing secure enclave detected");
}
public void deviceBindingDetected() {
Debug.Log("Device binding detected");
}
public void unofficialStoreDetected() {
Debug.Log("Unofficial store detected");
}
public void systemVPNDetected() {
Debug.Log("System VPN detected");
}
public void screenshotDetected() {
Debug.Log("Screenshot detected");
}
public void screenRecordingDetected() {
Debug.Log("Screen recording detected");
}
public void deviceIDDetected() {
Debug.Log("Device ID detected");
}Check out Data Visualisation Portal and register using your watcherMail to see your data. If you integrated the SDK successfully, the application will be present after a few hours. The visualisations will be active later due to the bucketing mechanism.
You have to use the same email for the Portal as you used for the watcherMail parameter.
The freeRASP has the following prerequisites that must be met before starting.
freeRASP for Android requires a minSdkVersion level of >=23 and a targetSdkVersion level of >=33. Some Capacitor projects, by default, support even lower levels of minimum and target SDKs. This creates an inconsistency we must solve by updating the SDK levels of the application:
From the root of your project, go to android > variables.gradle (or equivalent).
In ext, update minSdkVersion to at least 23 (Android 6.0) or higher.
ext {
minSdkVersion 23
}Since freeRASP 2.0.0, it is necessary to raise version of Kotlin in your project.
From the root of your project, go to android > build.gradle (or equivalent).
In buildscript.ext, update kotlin_version to at least 2.0.0 or higher.
buildscript {
ext {
kotlin_version = '2.0.0'
}To detect screenshots and screen recordings , add the following permissions to your AndroidManifest.xml file inside the <manifest> root tag:
<uses-permission android:name="android.permission.DETECT_SCREEN_CAPTURE" />
<uses-permission android:name="android.permission.DETECT_SCREEN_RECORDING" />Screenshot Detection is supported on Android 14 (API level 34) and higher. Screen Recording Detection is supported on Android 15 (API level 35) and higher.
To utilize active protection, you can use
import { blockScreenCapture } from 'capacitor-freerasp';
await blockScreenCapture(true);To receive whether the screen capture is blocked, you can use
import { isScreenCaptureBlocked } from 'capacitor-freerasp';
const response = await isScreenCaptureBlocked();For more details about all these screen capture methods, see Screen Capture.
Install the plugin using your preferred package manager
$ npm install capacitor-freeraspSynchronize the project files across native platforms
$ npx cap syncTo ensure freeRASP functions correctly, you need to provide the necessary configuration and initialize it. All required values must be filled in for the plugin to operate properly. Use the following template to configure the plugin. Detailed descriptions of the configuration options are provided on the API page.
For Android apps, you must get your expected signing certificate hashes in Base64 form. You can go through this manual to learn how to sign your app in more detail, including manual signing and using Google's Play app signing.
In the the entry point to your app, import freeRASP and add the code below.
import { startFreeRASP } from 'capacitor-freerasp';
// app configuration
const config = {
androidConfig: {
packageName: 'com.capacitor.example',
certificateHashes: ['mVr/qQLO8DKTwqlL+B1qigl9NoBnbiUs8b4c2Ewcz0k='], // replace with your release (!) signing certificate hash(es)
supportedAlternativeStores: ['com.sec.android.app.samsungapps'],
},
iosConfig: {
appBundleId: 'com.capacitor.example',
appTeamId: 'yourTeamID',
},
watcherMail: '[email protected]', // for Security Reports, Talsec Portal, Updates
isProd: true,
};freeRASP executes periodical checks when the application is running. You can handle the detected threats using listeners. For example, you can log the event, show a window to the user or kill the application. See the Threat detection in the wiki to learn more details about the performed checks and their importance for app security.
Threat reactions can be specified inside a JavaScript object, which is then passed into the initialization function:
// reactions for detected threats
const actions = {
// Android & iOS
: () => {
console.log('privilegedAccess');
},
// Android & iOS
: () => {
console.log('debug');
},
// Android & iOS
: () => {
console.log('simulator');
},
// Android & iOS
: () => {
console.log('appIntegrity');
},
// Android & iOS
: () => {
console.log('unofficialStore');
},
// Android & iOS
: () => {
console.log('hooks');
},
// Android & iOS
: () => {
console.log('deviceBinding');
},
// Android & iOS
: () => {
console.log('secureHardwareNotAvailable');
},
// Android & iOS
: () => {
console.log('systemVPN');
},
// Android & iOS
: () => {
console.log('passcode');
},
// iOS only
: () => {
console.log('deviceID');
},
// Android only
: () => {
console.log('obfuscationIssues');
},
// Android only
: () => {
console.log('devMode');
},
// Android only
: () => {
console.log('adbEnabled');
},
// Android & iOS
: () => {
console.log('screenshot');
},
// Android & iOS
: () => {
console.log('screenRecording');
},
// Android only
: () => {
console.log('multiInstance');
},
};Pass the configuration and reactions you set up in previous steps into startFreeRASP function.
// returns `true` if freeRASP starts successfully; you can ignore this value
const started = await startFreeRASP(config, actions);Based on your framework, we recommend:
In React: Wrap this function in useEffect with an empty dependency array
In Vue: Call the method inside the mounted property
In Angular: Call the method inside the ngOnInit method
The easiest way to obfuscate your app is via code minification, a technique that reduces the size of the compiled code by removing unnecessary characters, whitespace, and renaming variables and functions to shorter names. It can be configured for Android devices in android/app/build.gradle like so:
android {
buildTypes {
release {
minifyEnabled true
shrinkResources true
proguardFiles getDefaultProguardFile('proguard-android.txt'), 'proguard-rules.pro'
}
}
}Please note that some other modules in your app may rely on reflection, therefore it may be necessary to add corresponding keep rules into proguard-rules.pro file.
If there is a problem with the obfuscation, freeRASP will notify you about it via obfuscationIssues callback.
Read more about why this is important in the wiki.
freeMalwareDetection is a powerful feature designed to enhance the security of your Android application by quickly and efficiently scanning for malicious or suspicious applications (e.g. Android malware) based on various blacklists and security policies.
It helps to detect apps with suspicious package names, hashes, or potentially dangerous permissions.
Visit the freeMalwareDetection repository to learn more about this feature! For the integration, refer to the integration guide for the Capacitor platform.
Check out and register using your to see your data. If you integrated the SDK successfully, the application will be present after a few hours. The visualisations will be active later due to the bucketing mechanism.
You have to use the same email for the Portal as you used for the watcherMail parameter.
L0 - Detect Attacks: Check app security state with freeRASP & Talsec Portal insights
L1 - Protect App: Pass pentests, combat reverse engineering, and comply with regulations with and
L2 - Protect Transactions: Combat API abuse, bots, web-scraping and MiTM with
L3 - Protect Users: Combat social engineering, phishing, malware with and
Talsec offers enhanced features and benefits with our RASP+ plans, building on top of our freeRASP offering. Here’s what you can expect:
No limitations of freeRASP's Fair Usage Policy: Have an unrestricted number of app downloads* (beyond the 100k cap of freeRASP).
No Data Collection to Talsec Database: Your app's data is sent to your data collection services. You can even disable data collection.
FinTech Grade Security: Experience advanced security features and service-level agreements (SLAs) tailored for the financial technology sector.
Bypass Protection: RASP+ offers enhanced security with app-specific SDK customisation, while freeRASP uses a universal binary that is more susceptible to bypass.
Enhanced API Protection: Safeguard your APIs and benefit from risk scoring with our proprietary technology, AppiCrypt®.
For further details, please refer to the next page.
One of the most valued commercial features is AppiCrypt® - App Integrity Cryptogram.
It allows easy-to-implement API protection and App Integrity verification on the backend to prevent API abuse:
Bruteforce attacks
Botnets
API abuse by App impersonation
Session-hijacking
DDoS
It is a unified solution that works across all mobile platforms without dependency on external web services (i.e., without extra latency, an additional point of failure, and maintenance costs).
Learn more about commercial features at talsec.app.
You can try freeRASP and then upgrade easily to an enterprise service.
freeRASP is freemium software, i.e. there is a Fair Usage Policy (FUP) that imposes some limitations on free usage.
Runtime App Self Protection (RASP, app shielding)
freeRASP is a free, easy-to-integrate runtime threat detection solution for small businesses and projects, supporting up to 100,000 device downloads. It helps you quickly grasp the main features, experiment, and try integrating Talsec SDKs. While it is a good threat detection tool, freeRASP’s limited resilience against bypasses and limited telemetry data collection make it unsuitable for commercial use in production, especially in regulated or privacy-sensitive domains.
RASP+ delivers banking-grade security designed for professional, regulated, or high-risk apps needing maximum hardening. Its customizable SDKs include advanced threat prevention like AppiCrypt for API and Transaction Integrity protection. RASP+ is built to pass rigorous penetration tests, ensuring real-time detection and mitigation of attacks. With strict privacy (no data sent to Talsec), it guarantees compliance and robust defense.
Advanced root/jailbreak protections (including Magisk)
basic
advanced
Runtime reverse engineering controls
Debugger
Emulator / Simulator
Hooking and reversing frameworks (e.g. Frida, Magisk, XPosed, Cydia Substrate and more)
basic
advanced
Runtime integrity controls
Tampering protection
Repackaging / Cloning protection
Device binding protection
Unofficial store detection
Multi-instance detection
basic
advanced
Device OS security status check
HW security module control
Screen lock control
Google Play Services enabled/disabled
Last security patch update
System VPN control
Developer mode control
ADB enabled detection
yes
yes
Screen Capture
Screen capture protection
Screenshot detection
Screen recording cetection
yes
yes
UI protection
Overlay protection
Accessibility services misuse protection
no
yes
Penetration Test Ready
can be bypassed by professional
designed to sustain pentesting
Security hardening suite
- Strings Protection (e.g. API keys)
App Data End-to-End Encryption light (E2EE) [coming soon]
no
yes
- App Integrity Cryptogram
API protection by mobile client integrity check, online risk scoring, online fraud prevention, client App integrity check. The cryptographic proof of app & device integrity.
no
yes
Security events data collection, Auditing and Monitoring tools
Mandatory threat event data collection and sharing with Talsec
yes (collected to Talsec's DB)
no
Fully customizable and customer-controlled data collection
no
yes
UI portal for Logging, Data analytics, and Auditing
Talsec servers
Customer managed
Support and Maintenance
SLA
not committed
yes
Maintenance updates
not committed
yes
- up to 100k Devices
Total app downloads limit
Up to 100k Devices (premium upgrade required for more)
100k+ Devices
Mandatory threat event data collection and sharing with Talsec
yes
no
For additional comparison details and information on planned features, please see the next page.
Example:
The freeRASP has the following prerequisites that must be met before starting:
Minimum SDK level: 23 or higher
Gradle version: 8.12.1 or higher
Compile SDK version: 35
Kotlin version: 2.1.0
Some versions of Flutter projects, by default, support lower levels of minimum SDK or Gradle version.
From the root of your project, go to android > app > build.gradle
In defaultConfig, update minSdkVersion property to at least 23 (Android 6.0) or higher.
From the root of your project, go to android > settings.gradle
In plugins
Update version of com.android.application plugin to 8.8.1
Update version of org.jetbrains.kotlin.android plugin to 2.1.0
In older projects using imperative approach, the paths may be different:
From the root of your project, go to android > build.gradle
In dependencies , update version of com.android.tools.build:gradle dependecy to 8.8.1
Then you also need to update gradle wrapper:
From the root of your project, go to android > gradle> wrapper > gradle-wrapper.properties
In distributionUrl update version to 8.12.1
To utilize active protection, you can use
To check whether the screen capture is blocked, you can use:
For more details about all these screen capture methods, see .
Xcode 15 is required to be able to build the application
Run the following command inside the project directory to add the freeRASP dependency:
To ensure freeRASP functions correctly, you need to provide the necessary configuration and initialize it. All required values must be filled in for the plugin to operate properly. Detailed descriptions of the configuration options are provided.
For Android apps, you must get your expected signing certificate hashes in Base64 form. You can go through to learn how to sign your app in more detail, including manual signing and using Google's Play app signing.
In the entry point to your app, import freeRASP and add the following code:
It is necessary that Flutter Bindings are initialized. This can be satisfied by calling WidgetsFlutterBinding.ensureInitialized(), as shown in the code snippet above.
freeRASP executes periodical checks when the application is running. You can handle the detected threats using listeners. For example, you can log the event, show a window to the user or kill the application. See the in the wiki to learn more details about the performed checks and their importance for app security.
freeRASP reacts to threats using ThreatCallback. Internally, each threat has its own callback (of VoidCallback type), which is called when a threat is detected.
Optionally, you can implement RaspExecutionStateCallback to listen whether initial checks were done or not:
Start freeRASP to detect threats just by adding this line below the created config and the callback handler:
In order to provide as much protection as possible, freeRASP enhances security measures by implementing ProGuard consumer rules, which obfuscate specific sections of the SDK. However, these rules are applied to your Android app code as well due to inheritance.
In certain cases, you may prefer to exclude this rule.
To remove the rule, you need to find freerasp in your cache folder. More about where to find the cache folder . Then navigate to the freerasp-X.Y.Z/android/build.gradle file and delete the line:
Read more about why obfuscation is important in the.
freeMalwareDetection is a powerful feature designed to enhance the security of your Android application by quickly and efficiently scanning for malicious or suspicious applications (e.g. Android malware) based on various blacklists and security policies.
It helps to detect apps with suspicious package names, hashes, or potentially dangerous permissions.
Visit the repository to learn more about this feature! For the integration, refer to the for the Flutter platform.
Example:
The freeRASP has the following prerequisites that must be met before starting.
The Android implementation uses Kotlin serialization plugin; following line has to be added to the plugins block in platforms/android/build.gradle:
freeRASP requires minSdkVersion level of >=23, targetSdkVersion level of >=31, compileSdkVersion level of >=34, and Kotlin support.
Since freeRASP 8.0.0, it is also necessary to raise version of Kotlin above 2.0.0 in your project.
Add the following lines to the config.xml file in your project root directory.
Then run the following command to apply the preferences:
To and , add the following permission to your Android Manifest (via config.xml):
Screenshot Detection is supported on Android 14 (API level 34) and higher. Screen Recording Detection is supported on Android 15 (API level 35) and higher.
To utilize active protection, you can use
To receive whether the screen capture is blocked, you can use
For more details about all these screen capture methods, see .
freeRASP plugin uses Swift. Install the following plugin to support Swift in your project.
Install the plugin using Cordova CLI
To ensure freeRASP functions correctly, you need to provide the necessary configuration and initialize it. All required values must be filled in for the plugin to operate properly. Use the following template to configure the plugin. Detailed descriptions of the configuration options are provided.
For Android apps, you must get your expected signing certificate hashes in Base64 form. You can go through to learn how to sign your app in more detail, including manual signing and using Google's Play app signing.
In the the entry point to your app, import freeRASP and add the code below.
freeRASP executes periodical checks when the application is running. You can handle the detected threats using listeners. For example, you can log the event, show a window to the user or kill the application. See the in the wiki to learn more details about the performed checks and their importance for app security.
Threat reactions can be specified inside a JavaScript object, which is then passed into the initialization function:
freeRASP can be started after the Cordova initialization is completed, for example, inside the onDeviceReady function in the index.js.
The easiest way to obfuscate your app is via code minification, a technique that reduces the size of the compiled code by removing unnecessary characters, whitespace, and renaming variables and functions to shorter names. It can be configured for Android devices in android/app/build.gradle like so:
Additionally, create or extend proguard-rules.pro in android/app folder and exclude Cordova’s specific classes that rely on package names from being obfuscated:
Please note that some other modules in your app may rely on reflection, therefore it may be necessary to add corresponding keep rules into proguard-rules.pro file.
If there is a problem with the obfuscation, freeRASP will notify you about it via obfuscationIssues callback.
Read more about why this is important in the.
freeMalwareDetection is a powerful feature designed to enhance the security of your Android application by quickly and efficiently scanning for malicious or suspicious applications (e.g. Android malware) based on various blacklists and security policies.
It helps to detect apps with suspicious package names, hashes, or potentially dangerous permissions.
Visit the repository to learn more about this feature! For the integration, refer to the for the Cordova platform.
plugins {
id 'org.jetbrains.kotlin.plugin.serialization' version '1.7.10'
}<preference name="GradlePluginKotlinEnabled" value="true" />
<preference name="GradlePluginKotlinCodeStyle" value="official" />
<preference name="GradlePluginKotlinVersion" value="2.0.0" />
<preference name="android-minSdkVersion" value="23" />
<preference name="android-targetSdkVersion" value="31" />
<preference name="android-compileSdkVersion" value="34" />$ cordova prepare android <platform name="android">
<config-file target="AndroidManifest.xml" parent="/*">
<uses-permission android:name="android.permission.DETECT_SCREEN_CAPTURE" />
<uses-permission android:name="android.permission.DETECT_SCREEN_RECORDING" />
</config-file>
</platform>await talsec.blockScreenCapture(true);const response = await talsec.isScreenCaptureBlocked();$ cordova plugin add cordova-plugin-add-swift-support --savecordova plugin add cordova-talsec-plugin-freerasp/* global cordova, talsec */
const config = {
androidConfig: {
packageName: 'com.example.helloapp',
certificateHashes: ['mVr/qQLO8DKTwqlL+B1qigl9NoBnbiUs8b4c2Ewcz0k='], // replace with your release (!) signing certificate hash(es)
supportedAlternativeStores: ['com.sec.android.app.samsungapps'],
},
iosConfig: {
appBundleIds: 'com.example.helloapp',
appTeamId: 'your_team_ID'
},
watcherMail: '[email protected]', // for Security Reports, Talsec Portal, Updates
isProd: true
};// reactions to detected threats
const actions = {
// Android & iOS
: () => {
console.log('privilegedAccess');
},
// Android & iOS
: () => {
console.log('debug');
},
// Android & iOS
: () => {
console.log('simulator');
},
// Android & iOS
: () => {
console.log('appIntegrity');
},
// Android & iOS
: () => {
console.log('unofficialStore');
},
// Android & iOS
: () => {
console.log('hooks');
},
// Android & iOS
: () => {
console.log('deviceBinding');
},
// Android & iOS
: () => {
console.log('secureHardwareNotAvailable');
},
// Android & iOS
: () => {
console.log('systemVPN');
},
// Android & iOS
: () => {
console.log('passcode');
},
// iOS only
: () => {
console.log('deviceID');
},
// Android only
: () => {
console.log('obfuscationIssues');
},
// Android only
: () => {
console.log('devMode');
},
// Android only
: () => {
console.log('adbEnabled');
},
// Android & iOS
: () => {
console.log('screenshot');
},
// Android & iOS
: () => {
console.log('screenRecording');
},
// Android only
: () => {
console.log('multiInstance');
},
};talsec.start(config, actions)
.then(() => {
console.log('Talsec initialized.');
})
.catch((error) => {
console.log('Error during Talsec initialization: ', error);
});android {
buildTypes {
release {
minifyEnabled true
shrinkResources true
proguardFiles getDefaultProguardFile("proguard-android.txt"), "proguard-rules.pro"
}
}
}-keep class org.apache.cordova.** {*;}
-keep public class * extends org.apache.cordova.CordovaPlugin
-flattenpackagehierarchyCheck out Data Visualisation Portal and register using your watcherMail to see your data. If you integrated the SDK successfully, the application will be present after a few hours. The visualisations will be active later due to the bucketing mechanism.
You have to use the same email for the Portal as you used for the watcherMail parameter.
android {
compileSdk 35
// ... some other declarations ...
defaultConfig {
minSdkVersion 23
// ... some other declarations ...
}
}plugins {
id "dev.flutter.flutter-plugin-loader" version "1.0.0"
id "com.android.application" version "8.8.1" apply false
id "org.jetbrains.kotlin.android" version "2.1.0" apply false
}dependencies {
classpath 'com.android.tools.build:gradle:8.8.1'
classpath "org.jetbrains.kotlin:kotlin-gradle-plugin:$kotlin_version"
}distributionBase=GRADLE_USER_HOME
distributionPath=wrapper/dists
zipStoreBase=GRADLE_USER_HOME
zipStorePath=wrapper/dists
distributionUrl=https\://services.gradle.org/distributions/gradle-8.12.1-all.zipawait Talsec.instance.blockScreenCapture(enabled: true)await Talsec.instance.isScreenCaptureBlocked()flutter pub add freeraspimport 'package:freerasp/freerasp.dart';
void main() {
// This line is important!
WidgetsFlutterBinding.ensureInitialized();
// create a configuration for freeRASP
final config = TalsecConfig(
/// For Android
androidConfig: AndroidConfig(
packageName: 'your.package.name',
signingCertHashes: [
'mVr/qQLO8DKTwqlL+B1qigl9NoBnbiUs8b4c2Ewcz0k='
], // Replace with your release (!) signing certificate hash(es)
supportedStores: ['com.sec.android.app.samsungapps'],
),
/// For iOS
iosConfig: IOSConfig(
bundleIds: ['YOUR_APP_BUNDLE_ID'],
teamId: 'M8AK35...',
),
watcherMail: '[email protected]', // for Security Reports, Talsec Portal, Updates
isProd: true,
killOnBypass: true,
);
}import 'package:freerasp/freerasp.dart';
void main() {
// Setting up callbacks
final callback = ThreatCallback(
: () => print("App integrity"),
: () => print("Obfuscation issues"),
: () => print("Debugging"),
: () => print("Device binding"),
: () => print("Device ID"),
: () => print("Hooks"),
: () => print("Passcode not set"),
: () => print("Privileged access"),
: () => print("Secure hardware not available"),
: () => print("Simulator"),
: () => print("System VPN"),
: () => print("Developer mode"),
: () => print("USB debugging enabled"),
: () => print("Unofficial store"),
: () => print("Screenshot"),
: () => print("Screen recording"),
: () => print("Multi instance"),
: () => print("Unsecure wifi"),
: () => print("Location spoofing"),
: () => print("Time spoofing"),
onMalware: (suspiciousApps) => print("Suspicous apps")
);
// Attaching listener
Talsec.instance.attachListener(callback);
}import 'package:freerasp/freerasp.dart';
void main() {
// Some other code...
final raspExecutionStateCallback = RaspExecutionStateCallback(
onAllChecksDone: () => print("All checks done")
// Attaching listener
Talsec.instance.attachExecutionStateListener(callback);
}void main() async {
// start freeRASP
await Talsec.instance.start(config);
}consumerProguardFiles 'consumer-rules.pro'Check out Data Visualisation Portal and register using your watcherMail to see your data. If you integrated the SDK successfully, the application will be present after a few hours. The visualisations will be active later due to the bucketing mechanism.
You have to use the same email for the Portal as you used for the watcherMail parameter.
The freeRASP has the following prerequisites that must be met before starting.
freeRASP requires a minimum SDK level of 23. React Native projects, by default, support even lower levels of minimum SDK. This creates an inconsistency we must solve by updating the minimum SDK level of the application:
From the root of your project, go to android > build.gradle.
In buildscript, update minSdkVersion to at least 23 (Android 6.0) or higher.
buildscript {
ext {
minSdkVersion 23
}
}Since freeRASP 4.0.0, it is necessary to raise version of Kotlin in your project. This applies for projects running on RN < 0.77.
From the root of your project, go to android > build.gradle (or equivalent).
In buildscript.ext, update kotlinVersion to at least 2.0.0 or higher.
In buildscript.dependencies, specify the same version forkotlin-gradle-plugin .
buildscript {
ext {
kotlinVersion = '2.0.0'
}
dependencies {
classpath("org.jetbrains.kotlin:kotlin-gradle-plugin:2.0.0")
}To detect screenshots and screen recordings , add the following permissions to your AndroidManifest.xml file inside the <manifest> root tag:
<uses-permission android:name="android.permission.DETECT_SCREEN_CAPTURE" />
<uses-permission android:name="android.permission.DETECT_SCREEN_RECORDING" />Screenshot Detection is supported on Android 14 (API level 34) and higher. Screen Recording Detection is supported on Android 15 (API level 35) and higher.
To utilize active protection, you can use
import { blockScreenCapture } from 'freerasp-react-native';
await blockScreenCapture(true);To receive whether the screen capture is blocked, you can use
import { isScreenCaptureBlocked } from 'freerasp-react-native';
const response = await isScreenCaptureBlocked();For more details about all these screen capture methods, see Screen Capture.
freeRASP React Native plugin uses Pods. Navigate to the ios folder and run:
$ pod installInstall the plugin using your preferred package manager
npm install freerasp-react-nativeyarn add freerasp-react-nativeNavigate to the ios folder and run:
$ pod installTo ensure freeRASP functions correctly, you need to provide the necessary configuration and initialize it. All required values must be filled in for the plugin to operate properly. Use the following template to configure the plugin. Detailed descriptions of the configuration options are provided on the API page.
In the the entry point to your app, import freeRASP and add the code below.
For Android apps, you must get your expected signing certificate hashes in Base64 form. You can go through this manual to learn how to sign your app in more detail, including manual signing and using Google's Play app signing.
FreeRASP provides a React Custom Hook that handles all required logic as registration of freeRASP, mounting and unmounting of listeners for you.
import { useFreeRasp } from 'freerasp-react-native';
// app configuration
const config = {
androidConfig: {
packageName: 'com.awesomeproject',
certificateHashes: ['mVr/qQLO8DKTwqlL+B1qigl9NoBnbiUs8b4c2Ewcz0k='], // replace with your release (!) signing certificate hash(es)
supportedAlternativeStores: ['com.sec.android.app.samsungapps'],
},
iosConfig: {
appBundleId: 'com.awesomeproject',
appTeamId: 'your_team_ID',
},
watcherMail: '[email protected]', // for Security Reports, Talsec Portal, Updates
isProd: true,
};freeRASP executes periodical checks when the application is running. You can handle the detected threats using listeners. For example, you can log the event, show a window to the user or kill the application. See the Threat detection in the wiki to learn more details about the performed checks and their importance for app security.
Threat reactions should be specified inside a JavaScript object.
// reactions for detected threats
const actions = {
// Android & iOS
: () => {
console.log('privilegedAccess');
},
// Android & iOS
: () => {
console.log('debug');
},
// Android & iOS
: () => {
console.log('simulator');
},
// Android & iOS
: () => {
console.log('appIntegrity');
},
// Android & iOS
: () => {
console.log('unofficialStore');
},
// Android & iOS
: () => {
console.log('hooks');
},
// Android & iOS
: () => {
console.log('deviceBinding');
},
// Android & iOS
: () => {
console.log('secureHardwareNotAvailable');
},
// Android & iOS
: () => {
console.log('systemVPN');
},
// Android & iOS
: () => {
console.log('passcode');
},
// iOS only
: () => {
console.log('deviceID');
},
// Android only
: () => {
console.log('obfuscationIssues');
},
// Android only
: () => {
console.log('devMode');
},
// Android only
: () => {
console.log('adbEnabled');
},
// Android & iOS
: () => {
console.log('screenshot');
},
// Android & iOS
: () => {
console.log('screenRecording');
},
// Android only
: () => {
console.log('multiInstance');
},
};Start freeRASP to detect threats by calling the useFreeRasp hook, below the created config and the callback handler:
useFreeRasp(config, actions);When freeRASP initializes correctly, you should see freeRASP initialized message in the logs. Otherwise, you'll see a warning with a description of what went wrong.
Import methods from the freeRASP plugin:
import {
talsecStart,
setThreatListeners,
removeThreatListeners,
} from 'freerasp-react-native';Override componentDidMount() method in the entry point to your app set listeners to threats and start freeRASP:
async componentDidMount() {
await setThreatListeners(actions);
const response = await talsecStart(config);
console.log(response); // freeRASP started
}Override componentWillUnmount() method where you clean up the listeners:
componentWillUnmount() {
removeThreatListeners();
}The easiest way to obfuscate your app is via code minification, a technique that reduces the size of the compiled code by removing unnecessary characters, whitespace, and renaming variables and functions to shorter names. It can be configured for Android devices in android/app/build.gradle like:
android {
buildTypes {
release {
minifyEnabled true
shrinkResources true
proguardFiles getDefaultProguardFile('proguard-android.txt'), 'proguard-rules.pro'
}
}
}Please note that some other modules in your app may rely on reflection, therefore it may be necessary to add corresponding keep rules into proguard-rules.pro file.
If there is a problem with the obfuscation, freeRASP will notify you about it via obfuscationIssues callback.
Read more about why this is important in the wiki.
freeMalwareDetection is a powerful feature designed to enhance the security of your Android application by quickly and efficiently scanning for malicious or suspicious applications (e.g. Android malware) based on various blacklists and security policies.
It helps to detect apps with suspicious package names, hashes, or potentially dangerous permissions.
Visit the freeMalwareDetection repository to learn more about this feature! For the integration, refer to the integration guide for the React Native platform.
Check out and register using your to see your data. If you integrated the SDK successfully, the application will be present after a few hours. The visualisations will be active later due to the bucketing mechanism.
You have to use the same email for the Portal as you used for the watcherMail parameter.
This page is intended to provide quick answers to common questions.
Thank you for reading the freeRASP FAQ. If you didn't find the answer to your question, please do not hesitate to on the respective repository (preferably) or email [email protected].
Community [Apply to Join!]
Space for developer's creativity, community programs
Example:
freeRASP requires a minimum SDK level of 23. To update the minimum SDK level of the application, follow these steps:
From the root of your project (or module level), go to the build.gradle.
Update minSdkVersion to at least 23 (Android 6.0) or higher.
Set Talsec's Artifact Registry in your project's settings.gradle (or build.gradle). You should comment out the relevant section in settings.gradle, if you want to use build.gradle, as settings.gradle is preferred:
Config via settings.gradle:
Config via build.gradle:
Make sure that Talsec's maven dependency is at the last position.
Set dependencies in your :app module's build.gradle:
To ensure freeRASP functions correctly, you need to provide the necessary configuration. All required values must be filled in for the plugin to operate properly. Use the following template to configure the plugin. Detailed descriptions of the configuration options are provided .
Create an arbitrary subclass of Application(), override its onCreate()method, and implement ThreatListener.ThreatDetected interface. You can, of course, use your Application subclass if you already have one in your project. If you encounter issues importing ThreatListener.ThreatDetected, please use 'Sync Project with Gradle Files' to resolve them.“
Add a new subclass to AndroidManifest.xml, inside <application> tag:
Set up the Configuration for your app with your values, which are explained in more detail in .
You can handle the detected threats using listeners. For example, you can log the event, show a window to the user or kill the application. See the to learn more details about the performed checks and their importance for app security.
Implement methods of ThreatListener.ThreatDetected interface:
Optionally, you can use a device state listener to get additional information about the device state, like passcode lock and HW-backed Keystore state:
Optionally, you can use the RaspExecutionState listener, to get information about state of check execution:
Modify initialization of ThreatListener:
(Optional) You can integrate the screen capture methods to detect threats like screenshots - onScreenshotDetected() or screen recording - onScreenRecordingDetected(). If you do not implement the steps below, these detections will not work, in that case, you can just leave the implementations empty.
To use onScreenshotDetected() you have to be on Android 14+ (API 34+). Also, the application needs the following permission:
To use onScreenRecordingDetected() you have to be on Android 15+ (API 35+). Also, the application needs the following permission:
To utilize active protection, you can use Talsec.blockScreenCapture(activity, true). To receive whether the screen capture is blocked, you can use the Talsec.isScreenCaptureBlocked(). For more details about all these screen capture methods, see . Integration of all these methods should be performed at the Application level to best address the Android lifecycle:
You can make sure that the obfuscation is enabled by checking the value of minifyEnabled property in your module's build.gradle file.
Read more about why this is important in the.
freeMalwareDetection is a powerful feature designed to enhance the security of your Android application by quickly and efficiently scanning for malicious or suspicious applications (e.g. Android malware) based on various blacklists and security policies.
It helps to detect apps with suspicious package names, hashes, or potentially dangerous permissions.
Visit the repository to learn more about this feature! For the integration, refer to the for the Android platform.
Some checks require additional permissions in order to work properly. If your app already has these permissions, you don't need to add them again.
To and screen recordings , add the following permissions to your AndroidManifest.xml file inside the <manifest> root tag:
Screenshot Detection is supported on Android 14 (API level 34) and higher. Screen Recording Detection is supported on Android 15 (API level 35) and higher.
To detect location spoofing, add the following permissions to your AndroidManifest.xml file inside the <manifest> root tag:
To detect unsecure WiFi, add the following permissions to your AndroidManifest.xml file inside the <manifest> root tag:
buildscript {
ext {
minSdkVersion 23
}
}repositories {
google()
mavenCentral()
maven { url "https://jitpack.io" }
maven { url "https://europe-west3-maven.pkg.dev/talsec-artifact-repository/freerasp" }
}repositories {
google()
mavenCentral()
maven { url = uri ("https://jitpack.io") }
maven { url = uri ("https://europe-west3-maven.pkg.dev/talsec-artifact-repository/freerasp") }
}dependencies {
// freeRASP SDK
implementation 'com.aheaditec.talsec.security:TalsecSecurity-Community:17.0.0'
}class TalsecApplication : Application(), ThreatListener.ThreatDetected {
override fun onCreate() {
super.onCreate()
}
}<application
android:name=".TalsecApplication"
/>companion object {
private const val expectedPackageName = "com.aheaditec.talsec.demoapp" // don't use Context.getPackageName!
private val expectedSigningCertificateHashBase64 = arrayOf(
"mVr/qQLO8DKTwqlL+B1qigl9NoBnbiUs8b4c2Ewcz0k="
) // replace with your release (!) signing certificate hash(es)
private const val watcherMail = "[email protected]" // for Security Reports, Talsec Portal, Updates
private val supportedAlternativeStores = arrayOf(
"com.sec.android.app.samsungapps" // add other stores, such as the Samsung Galaxy Store
)
private val = true
private val killOnBypass = true
}override fun onCreate() {
...
val config = TalsecConfig.Builder(
expectedPackageName,
expectedSigningCertificateHashBase64)
.watcherMail(watcherMail)
.supportedAlternativeStores(supportedAlternativeStores)
.prod(isProd)
.killOnBypass(killOnBypass)
.build()
}override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun (suspiciousApps: List<SuspiciousAppInfo>) {
println("onMalwareDetected")
}private val deviceStateListener = object : ThreatListener.DeviceState {
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
override fun () {
TODO("Not yet implemented")
}
}private val raspExecutionListener = object : ThreatListener.RaspExecutionState() {
override fun onAllChecksFinished() {
println("onAllChecksFinished")
}
}override fun onCreate() {
...
// listens only for threats detected
// ThreatListener(this).registerListener(this)
// listens for threats detected, and device state
// ThreatListener(this, deviceStateListener).registerListener(this)
// listens for all threats detected, device state, and execution state
ThreatListener(this, deviceStateListener, raspExecutionListener).registerListener(this)
}<uses-permission android:name="android.permission.DETECT_SCREEN_CAPTURE" /><uses-permission android:name="android.permission.DETECT_SCREEN_RECORDING" />class TalsecApplication : Application(), ThreatListener.ThreatDetected {
override fun onCreate() {
...
registerActivityLifecycleCallbacks(object : ActivityLifecycleCallbacks {
override fun onActivityCreated(activity: Activity, bundle: Bundle?) {
Talsec.blockScreenCapture(activity, false)
}
override fun onActivityStarted(activity: Activity) {}
override fun onActivityResumed(activity: Activity) {
ScreenProtector.INSTANCE.registerScreenCallbacks(activity)
}
override fun onActivityPaused(activity: Activity) {
ScreenProtector.INSTANCE.unregisterScreenCallbacks(activity)
}
override fun onActivityStopped(activity: Activity) {}
override fun onActivitySaveInstanceState(activity: Activity, bundle: Bundle) {}
override fun onActivityDestroyed(activity: Activity) {}
})
}
}override fun onCreate() {
...
Talsec.start(this, config)
}android {
...
buildTypes {
release {
minifyEnabled true
shrinkResources true
proguardFiles getDefaultProguardFile('proguard-android.txt'), 'proguard-rules.pro'
}
}
}repositories {
google()
mavenCentral()
maven { url "https://jitpack.io" }
maven { url "https://europe-west3-maven.pkg.dev/talsec-artifact-repository/freerasp" }
}Some checks require additional permissions in order to work properly. If your app already has these permissions, you don't need to add them again.
To detect screenshots and screen recordings , add the following permissions to your AndroidManifest.xml file inside the <manifest> root tag:
<uses-permission android:name="android.permission.DETECT_SCREEN_CAPTURE" />
<uses-permission android:name="android.permission.DETECT_SCREEN_RECORDING" />Screenshot Detection is supported on Android 14 (API level 34) and higher. Screen Recording Detection is supported on Android 15 (API level 35) and higher.
To detect location spoofing, add the following permissions to your AndroidManifest.xml file inside the <manifest> root tag:
<uses-permission android:name="android.permission.ACCESS_COARSE_LOCATION" />
<uses-permission android:name="android.permission.ACCESS_FINE_LOCATION" />To detect unsecure WiFi, add the following permissions to your AndroidManifest.xml file inside the <manifest> root tag:
<uses-permission android:name="android.permission.ACCESS_FINE_LOCATION" />
<uses-permission android:name="android.permission.ACCESS_WIFI_STATE" />Check out Data Visualisation Portal and register using your watcherMail to see your data. If you integrated the SDK successfully, the application will be present after a few hours. The visualisations will be active later due to the bucketing mechanism.
You have to use the same email for the Portal as you used for the watcherMail parameter.
repositories {
google()
mavenCentral()
maven { url = uri("https://jitpack.io") }
maven { url = uri("https://europe-west3-maven.pkg.dev/talsec-artifact-repository/freerasp") }
}<uses-permission android:name="android.permission.DETECT_SCREEN_CAPTURE" />
<uses-permission android:name="android.permission.DETECT_SCREEN_RECORDING" /><uses-permission android:name="android.permission.ACCESS_COARSE_LOCATION" />
<uses-permission android:name="android.permission.ACCESS_FINE_LOCATION" /><uses-permission android:name="android.permission.ACCESS_FINE_LOCATION" />
<uses-permission android:name="android.permission.ACCESS_WIFI_STATE" />Stay up-to-date with the latest features, improvements and bug fixes for freeRASP. Here you'll find detailed information about each update we've rolled out, organized by platform. Whether you're using the Android, iOS, Flutter, React Native, Capacitor, or Cordova version, all platforms are supported.
Explore the tabs below to see what's new and how the experience has been improved for you. If you're looking for specific changes or features, each update is documented for your convenience.
Learn more: https://docs.talsec.app/appsec-articles
❗️Breaking: Added killOnBypass method to the TalsecConfig.Builder that configures if the app should be terminated when the threat callbacks are suppressed/hooked by an attacker Issue 65
❗️Breaking: Added onTimeSpoofingDetected() callback to ThreatDetected interface
We are introducing a new capability, detecting whether the device time has been tampered with
❗️Breaking: Added onLocationSpoofing() callback
We are introducing a new capability, detecting whether the location is being spoofed on the device.
❗️Breaking: Added onUnsecureWifi() callback to ThreatDetected interface
❗️Breaking: Changed onMalwareDetected() method parameter packageInfo to non-nullable
❗️Breaking: Updated dispatchKeyEvent() parameter nullability from @Nullable to @NonNull
❗️Breaking: Changed parameter type of Activity instead of Context in the blockScreenCapture() method
❗️Breaking: Removed deprecated functionality Pbkdf2Native and both related native libraries (libpbkdf2_native.so and libpolarssl.so)
Added ScreenProtector feature wrapper object that helps with registration/unregistration of screen protection features
A new constructor parameter of type RaspExecutionState in class ThreatListenerrepresenting changes in state in our library. RaspExecutionState contains onAllChecksFinished() method, which is triggered after all checks are completed.
Added matched permissions to SuspiciousAppInfo object when malware detection reason is suspiciousPermission
New option to start Talsec, Talsec.start() takes new parameter TalsecMode that determines the dispatcher thread of initialization and sync checks
Capability to check if another app has an option REQUEST_INSTALL_PACKAGES enabled in the system settings to malware detection
ANR issue caused by registerScreenCaptureCallback() method on the main thread
NullPointerException when checking key alias in Keystore on Android 7
JaCoCo issue causing MethodTooLargeException during instrumentation
DeadApplicationException when calling Settings.Global.getInt or Settings.Secure.getInt on invalid context
AndroidKeyStore crashes causing java.util.concurrent.TimeoutException when calling finalize() method on Cipher (GC issues)
Shortened the value of threat detection interval
Refactoring of internal architecture of SDK that newly uses Coroutines to manage threading
Update of internal dependencies and security libraries
❗️Added onMultiInstanceDetected() callback - detection whether the application is installed/running in various multi-instancing environments (e.g. Parallel Space).
Added support for 16 KB memory page sizes.
The ADB service running as "root" is a signal for root detection.
Improved emulator detection.
Internal security improvements.
Removed malware report duplicates.
Added new root detection checks.
Added eventId to the logs, which is unique per each log. It allows traceability of the same log across various systems.
Added externalId to put an integrator-specified custom identifier into the logs. This feature will be presented later.
Resolved SecurityException caused by getNetworkCapabilities() - Android 11 specific bug (GH Android issue #56).
Compile API increased to 35, dependencies updated
Internal library obfuscation reworked
Root detection divided into 2 parts (quick initial checks, and time-demanding asynchronous post checks)
ANR issues bug-fixing
❗️Added onScreenshotDetected() - detection of screenshots, refer to the Android freeRASP integration documentation.
❗️Added onScreenRecordingDetected() - detection of screen recording, refer to the Android freeRASP integration documentation.
Added blockScreenCapture(Activity activity, boolean enable) for FLAG_SECURE control, an active protection against screen capturing.
isScreenCaptureBlocked() - to receive whether the screen capture is blocked
Rate limiting for both screenshot and screenRecording incidents
Improved root detection capabilities
Updated proguard rules to fix warnings from okhttp dependency.
Added request integrity information to data collection headers.
Enhanced and accelerated the data collection logic.
BREAKING CHANGE: Added onADBEnabledDetected detection feature, which allows you to detect USB debugging option enabled in the developer settings on the device. App needs to implement this new callback.
Refactored Magisk checks in the root detection
Internal refactoring of Malware detection feature
Bug Fix
Resolved IllegalArgumentException caused by unregistering not registered receiver in TalsecMonitoringReceiver
Reported ANR issues present on some devices were resolved (GH issue #138).
Reported crashes caused by ConcurrentModificationException and NullPointerException were resolved (GH Flutter #140).
Reported crashes caused by the UnsupportedOperationException were resolved.
False positives in Hook detection (runtimeManipulation).
Added onMalwareDetected to ThreatListener.ThreatDetected interface, this is a breaking change and the onMalwareDetected has to be implemented by the integrating application.
Important Information
Further details for this feature will be provided shortly with the new repositories.
For now, do not react to the callback, you can implement it simply by just using println().
Added the auditing of the internal execution for the future check optimization and overall security improvements.
Changed the way TalsecConfig is created, we introduced a Builder pattern to make the process more streamlined and readable.
Updated CURL to 8.8.0 and OpenSSL to 3.0.14 (Github issue #114).
Refactored fetching the list of installed applications for root and hook detection.
Fixed native crashes (SEGFAULT errors) in ifpip method.
Fixed collision for command line tools (like ping) invoked without absolute path (Github issue #41).
Two new threat callbacks, onDeveloperModeDetected and onSystemVPNDetected, have been added for detecting Developer mode and System VPN.
Updated GMS dependency to a newer version for improved performance and compatibility.
Updated CA bundle to enhance security for secure connections.
Resolved a problem with displaying the Arabic alphabet in logs caused by the device’s default system locale.
Updated freeRASP SDK artifact hosting ensuring better stability and availability.
Shortened duration of threat evaluation.
Improved appIntegrity check and its logging.
Updated CURL to 8.5.0 and OpenSSL to 1.1.1w.
Fixed a native crash bug during one of the native root checks (detected after NDK upgrade).
Increased the compileSdk and targetSdk in the demo application.
Updated dependencies in the demo application.
Fixed issue with ProviderException (#26).
Curious about more in-depth changes for Android? Head over to our GitHub Changelog for the complete history of updates!
Added palera1n jailbreak detection
Improved Dopamine jailbreak detection
Resolved memory-related stability issues.
Screen capture protection obscuring app content in screenshots and screen recordings preventing unauthorized content capture. Refer to the iOS freeRASP integration documentation.
Added externalId to put an integrator-specified custom identifier into the logs. This feature will be presented later.
Added eventId to the logs, which is unique per each log. It allows traceability of the same log across various systems.
Resolved an issue that prevented Xcode tests from running correctly.
Resolved an issue with the screen recording detection.
Improvement of the obfuscation of the SDK
Deep signing of the OpenSSL binaries
Enhanced security with our new Screen Capture Threat Detection, now capable of identifying screen recording, AirPlay mirroring, and screenshots to guard against unauthorized viewing. Check out the new screenshot and screenRecording callbacks.
Updated SDK code signing; it will now be signed with:
Team ID: PBDDS45LQS
Team Name: Lynx SFT s.r.o.
Added Serotonin jailbreak detection.
Renewed the signing certificate.
Dopamine jailbreak detection.
Updated OpenSSL to version 3.0.14 and CURL to version 8.8.0. (Github issue #114)
Added request integrity information to data collection.
Significantly improved the response time from data collection service.
Added new threat callback systemVPN for System VPN detection.
Passcode check is now performed periodically.
Updated the CA bundle to enhance security for secure connections.
Resolved a problem with displaying the Arabic alphabet in logs caused by the device’s default system locale.
Added Privacy Manifest.
Added codesigning for the SDK, it is signed by:
Team ID: ASQC376HCN,
Team Name: AHEAD iTec, s.r.o..
Updated CURL to 8.5.0 and OpenSSL to 1.1.1w.
Improved obfuscation of Swift and C strings.
Fixed memory leak (#13).
Curious about more in-depth changes for iOS? Head over to our GitHub Changelog for the complete history of updates!
Added killOnBypass to TalsecConfig that configures if the app should be terminated when the threat callbacks are suppressed/hooked by an attacker (Android only) (Issue 65)
Added onTimeSpoofing callback to ThreatCallback for handling Threat.timeSpoofing threat (Android only)
We are introducing a new capability, detecting whether the device time has been tampered with
Added onLocationSpoofing callback to ThreatCallback for handling Threat.locationSpoofing threat (Android only)
We are introducing a new capability, detecting whether the location is being spoofed on the device.
Added onUnsecureWifi callback to ThreatCallback for handling Threat.unsecureWifi threat (Android only)
We are introducing a new capability, detecting whether the device is connected to an unsecured Wi-Fi network.
Added onAllChecksDone callback to new RaspExecutionStateCallback
We are introducing a new callback that notifies when all security checks have been completed.
Removed deprecated functionality Pbkdf2Native and both related native libraries (libpbkdf2_native.so and libpolarssl.so)
Updated internal dependencies
[Android] Fixed an issue with crashing screen protector
[iOS] Fixed an issue with native framework
Added interface for multi-instance detection
[iOS] Added palera1n jailbreak detection
[iOS] Improved Dopamine jailbreak detection
[Android] Improved emulator detection
[Android] Added support for 16 KB pages
[iOS] Resolved memory-related stability issues
[Android] Removed malware report duplicates
Added interface for screenshot / screen recording blocking on iOS.
Improvements
Added interface for external ID storage.
Added eventId to the logs, which is unique per each log. It allows traceability of the same log across various systems.
[Android] New root detection checks added.
Fixed
Issue that caused compilation errors due to unknown references.
[iOS] Resolved an issue with the screen recording detection.
[iOS] Resolved an issue that prevented Xcode tests from running correctly.
fvm support for Flutter version management
Updated versions for example app
[Android] Breaking: Raised Kotlin version to 2.1.0
[Android] Compile API increased to 35, dependencies updated
[Android] Internal library obfuscation reworked
[Android] Root detection divided into 2 parts (quick initial checks, and time-demanding asynchronous post checks)
[iOS] Improvement of the obfuscation of the SDK
[iOS] Deep signing of the OpenSSL binaries
[Android] ANR issues bug-fixing
Added screenshot - detection of screenshots, refer to the freeRASP integration documentation.
Added screenRecording - detection of screen recording, refer to the freeRASP integration documentation.
Added blockScreenCapture for FLAG_SECURE control, an active protection against screen capturing.
Added isScreenCaptureBlocked - to receive whether the screen capture is blocked
[Android] Raised Android CompileSDK level to 35
[Android] Monitoring is now disabled by default
[Android] Improved root detection
[Android] Proguard rules to address warnings from okhttp dependency
[Android] Added request integrity information to data collection headers.
[Android] Enhanced and accelerated the data collection logic.
App icons for detected malware are not fetched automatically anymore, which reduces computation required to retrieve malware data. From now on, app icons have to be retrieved using the getAppIcon method
[Android] Malware data is now parsed on background thread to improve responsiveness.
[Android] onADBEnabled callback, allowing you to detect USB debugging option enabled in the developer settings on the device.
[Android] Malware detection as a new callback for enhanced app security.
[Android] Internal refactoring of Malware detection feature.
[Android] Refactoring Magisk checks in the root detection.
[iOS] Enhanced security with Serotonin Jailbreak Detection to identify compromised devices.
Maintenance
[iOS] Updated SDK code signing; it will now be signed with:
Team ID: PBDDS45LQS
Team Name: Lynx SFT s.r.o.
[Android] Resolved IllegalArgumentException caused by unregistering not registered receiver in TalsecMonitoringReceiver
[iOS] Renewed the signing certificate.
[Android] Reported ANR issues present on some devices were resolved (GH Flutter issue #138).
[Android] Reported crashes caused by ConcurrentModificationException and NullPointerException were resolved (GH Flutter issue #140).
[Android] Reported crashes caused by the UnsupportedOperationException were resolved.
[Android] False positives for hook detection.
[Android] Added the auditing of the internal execution for the future check optimization and overall security improvements.
[iOS] Dopamine jailbreak detection.
Migration to declarative Gradle plugin.
Updated CURL to 8.8.0 and OpenSSL to 3.0.14 (Github issue #114).
[Android] TalsecConfig creation was migrated to a Builder pattern.
[Android] Refactored fetching the list of installed applications for root and hook detection.
[iOS] Enhanced and accelerated the data collection logic.
[Android] Native crashes (SEGFAULT) in ifpip method.
[Android] Fixed collision for command line tools (like ping) invoked without absolute path (Github issue #41).
Added new threat Threat.systemVPN for VPN detection.
Added new callback onSystemVPN in ThreatCallback for handling Threat.systemVPN threat.
[Android] Added a new threat detection feature, Threat.devMode, to identify Developer mode.
[Android] Added a new callback onDevMode in ThreatCallback for handling Threat.devMode threat.
Increased minimal Dart SDK version to 2.18.0 and minimal Flutter version to 3.3.0
Updated the CA bundle to enhance security for secure connections.
[Android] Increased the version of the GMS dependency
[iOS] Passcode check is now performed periodically.
Resolved a problem in logging caused by the device’s default system locale
[Android] New Talsec SDK artifact hosting - better stability and availibility.
[iOS] Added Privacy Manifest.
[iOS] Added codesigning for the SDK, it is signed by:
Team ID: ASQC376HCN,
Team Name: AHEAD iTec, s.r.o..
Updated CURL to 8.5.0 and OpenSSL to 1.1.1w.
[Android] Improved appIntegrity check and its logging.
[iOS] Improved obfuscation of Swift and C strings.
[Android] Fixed issue with disappearing threats when the app is quickly put into the background and then back to the foreground (resolves issue #91).
[Android] Fixed a native crash bug during one of the native root checks (detected after NDK upgrade).
Improved reaction obfuscation.
[iOS] Improved obfuscation of the iOS SDK.
[iOS] Raised supported Xcode version to 14.3.1 .
[Android] Fixed ProviderException.
Fixed typo in namespace which caused incompatibility with AGP 8.0 .
Curious about more in-depth changes for Flutter? Head over to our GitHub Changelog for the complete history of updates!
Added interface for multi-instance detection
[iOS] Added palera1n jailbreak detection
[iOS] Improved Dopamine jailbreak detection
[Android] Improved emulator detection
[Android] Added support for 16 KB pages
[iOS] Resolved memory-related stability issues
[Android] Removed malware report duplicates
Added interface for screenshot / screen recording blocking on iOS.
Improvements
Added interface for external ID storage.
Added eventId to the logs, which is unique per each log. It allows traceability of the same log across various systems.
[Android] New root detection checks added.
Fixed
[iOS] Resolved an issue with the screen recording detection.
[iOS] Resolved an issue that prevented Xcode tests from running correctly.
Android SDK requires kotlin_version >= 2.0.0
Set Java version to 17
[Android] Compile API increased to 35, dependencies updated
[Android] Internal library obfuscation reworked
[Android] Root detection divided into 2 parts (quick initial checks, and time-demanding asynchronous post checks)
[iOS] Improvement of the obfuscation of the SDK
[iOS] Deep signing of the OpenSSL binaries
[Android] ANR issues bug-fixing
Added screenshot - detection of screenshots, refer to the freeRASP integration documentation.
Added screenRecording - detection of screen recording, refer to the freeRASP integration documentation.
Added blockScreenCapture for FLAG_SECURE control, an active protection against screen capturing.
Added isScreenCaptureBlocked - to receive whether the screen capture is blocked
[Android] Raised Android compileSDK level to 35
[Android] Improved root detection
Compatibility issues with RN New Architecture
[Android] Added proguard rules for malware data serialization in release mode on Android
[Android] Proguard rules to address warnings from okhttp dependency
[Android] Added request integrity information to data collection headers.
[Android] Enhanced and accelerated the data collection logic.
App icons for detected malware are not fetched automatically anymore, which reduces computation required to retrieve malware data. From now on, app icons have to be retrieved using the getAppIcon method.
Parsing of malware data is now async.
[Android] Malware data is now parsed on background thread to improve responsiveness.
[Android] adbEnabled callback, allowing you to detect USB debugging option enabled in the developer settings on the device.
Added configuration fields for malware detection.
[Android] Malware detection as a new callback for enhanced app security.
[Android] Refactoring Magisk checks in the root detection.
[iOS] Enhanced security with Serotonin Jailbreak Detection to identify compromised devices.
Maintenance
[iOS] Updated SDK code signing; it will now be signed with:
Team ID: PBDDS45LQS
Team Name: Lynx SFT s.r.o.
[iOS] Renewed the signing certificate.
[Android] Reported ANR issues present on some devices were resolved (GH Flutter issue #138).
[Android] Reported crashes caused by ConcurrentModificationException and NullPointerException were resolved (GH Flutter issue #140).
[Android] Reported crashes caused by the UnsupportedOperationException were resolved.
[Android] False positives for hook detection.
[Android] Added the auditing of the internal execution for the future check optimization and overall security improvements.
[iOS] Dopamine jailbreak detection.
Improved error messages when validation of the freeRASP configuration fails.
Updated CURL to 8.8.0 and OpenSSL to 3.0.14 (Github issue #114).
[Android] Changed the way TalsecConfig is created, we introduced a Builder pattern to make the process more streamlined and readable.
[Android] Refactored fetching the list of installed applications for root and hook detection.
Fixed incorrect path to types in package.json.
[Android] Fixed native crashes (SEGFAULT errors) in ifpip method.
[Android] Fixed collision for command line tools (like ping) invoked without absolute path (Github issue #41).
Updated proguard rules to resolve build issues in RN 0.75.x.
Added a new threat systemVPN for VPN detection.
[Android] Added a new threat devMode for Developer mode detection.
Updated the CA bundle to enhance security for secure connections.
[Android] Updated the GMS dependency to a newer version for improved performance and compatibility.
[iOS] Enhanced and accelerated the data collection logic.
[iOS] Passcode check is now performed periodically.
Resolved a problem with displaying the Arabic alphabet in logs caused by the device’s default system locale.
[Android] Fixed proguard warning in specific versions of RN.
Updated expo config plugin to fix release build issue in RN 0.73.
[Android] Updated freeRASP SDK artifact hosting ensuring better stability and availibility.
[Android] Fixed compatibility issues with RN < 0.63.
Added support for apps built with Expo SDK.
[iOS] Added Privacy Manifest.
[iOS] Added codesigning for the SDK, it is signed by:
Team ID: ASQC376HCN,
Team Name: AHEAD iTec, s.r.o..
Updated CURL to 8.5.0 and OpenSSL to 1.1.1w.
[Android] Shortened duration of threat evaluation.
[Android] Improved appIntegrity check and its logging.
[iOS] Improved obfuscation of Swift and C strings.
[Android] Fixed a native crash bug during one of the native root checks (detected after NDK upgrade).
[iOS] Fixed memory leak (freeRASP iOS issue #13).
Curious about more in-depth changes for React Native? Head over to our GitHub Changelog for the complete history of updates!
Added interface for multi-instance detection
[iOS] Added palera1n jailbreak detection
[iOS] Improved Dopamine jailbreak detection
[Android] Improved emulator detection
[Android] Added support for 16 KB pages
[iOS] Resolved memory-related stability issues
[Android] Removed malware report duplicates
Added interface for screenshot / screen recording blocking on iOS.
Changed
Plugin now requires kotlin version >= 2.0.0.
Improvements
Added interface for external ID storage.
Added eventId to the logs, which is unique per each log. It allows traceability of the same log across various systems.
[Android] New root detection checks added.
Fixed
[iOS] Resolved an issue with the screen recording detection.
[iOS] Resolved an issue that prevented Xcode tests from running correctly.
[Android] Compile API increased to 35, dependencies updated
[Android] Internal library obfuscation reworked
[Android] Root detection divided into 2 parts (quick initial checks, and time-demanding asynchronous post checks)
[iOS] Improvement of the obfuscation of the SDK
[iOS] Deep signing of the OpenSSL binaries
[Android] ANR issues bug-fixing
Added screenshot - detection of screenshots, refer to the freeRASP integration documentation.
Added screenRecording - detection of screen recording, refer to the freeRASP integration documentation.
Added blockScreenCapture for FLAG_SECURE control, an active protection against screen capturing.
Added isScreenCaptureBlocked - to receive whether the screen capture is blocked
[Android] Set following required SDK versions for Android plugin:
minSdkVersion 23
targetSdkVersion to 35
compileSdkVersion to 35
[Android] Improved root detection
[Android] Proguard rules to address warnings from okhttp dependency
[Android] Added request integrity information to data collection headers.
[Android] Enhanced and accelerated the data collection logic.
App icons for detected malware are not fetched automatically anymore, which reduces computation required to retrieve malware data. From now on, app icons have to be retrieved using the getAppIcon method.
Parsing of malware data is now async.
[Android] Malware data is now parsed on background thread to improve responsiveness.
[Android] adbEnabled callback, allowing you to detect USB debugging option enabled in the developer settings on the device.
Added configuration fields for malware detection.
[Android] Malware detection as a new callback for enhanced app security.
[Android] Refactoring Magisk checks in the root detection.
[iOS] Enhanced security with Serotonin Jailbreak Detection to identify compromised devices.
Maintenance
BREAKING CHANGE: New dependency is required to run freeRASP; add following plugin to android/build.gradle:
plugins {
id 'org.jetbrains.kotlin.plugin.serialization' version '1.7.10'
}[iOS] Updated SDK code signing; it will now be signed with:
Team ID: PBDDS45LQS
Team Name: Lynx SFT s.r.o.
[Android] Resolved IllegalArgumentException caused by unregistering not registered receiver in TalsecMonitoringReceiver
[iOS] Renewed the signing certificate.
[Android] Reported ANR issues present on some devices were resolved (GH Flutter issue #138).
[Android] Reported crashes caused by ConcurrentModificationException and NullPointerException were resolved (GH Flutter issue #140).
[Android] Reported crashes caused by the UnsupportedOperationException were resolved.
[Android] False positives for hook detection.
[Android] Added the auditing of the internal execution for the future check optimization and overall security improvements.
[iOS] Dopamine jailbreak detection.
Improved error messages when validation of the freeRASP configuration fails.
Updated CURL to 8.8.0 and OpenSSL to 3.0.14 (Github issue #114).
[Android] Changed the way TalsecConfig is created, we introduced a Builder pattern to make the process more streamlined and readable.
[Android] Refactored fetching the list of installed applications for root and hook detection.
[iOS] Enhanced and accelerated the data collection logic.
[Android] Fixed native crashes (SEGFAULT errors) in ifpip method.
[Android] Fixed collision for command line tools (like ping) invoked without absolute path (Github issue #41).
Added a new threat systemVPN for VPN detection.
[Android] Added a new threat devMode for Developer mode detection.
Updated the CA bundle to enhance security for secure connections.
[Android] Updated the GMS dependency to a newer version for improved performance and compatibility.
[iOS] Passcode check is now performed periodically.
Resolved a problem with displaying the Arabic alphabet in logs caused by the device’s default system locale.
Fixed BAD_ACCESS error occurring in specific versions of cordova-ios plugin (#28).
[Android] Removed the talsec namespace that caused change of namespaces for whole app.
[iOS] Fixed issue causing app crash with lower versions of cordova-ios plugin.
[Android] Updated freeRASP SDK artifact hosting ensuring better stability and availibility.
Curious about more in-depth changes for Cordova? Head over to our GitHub Changelog for the complete history of updates!
Added interface for multi-instance detection
[iOS] Added palera1n jailbreak detection
[iOS] Improved Dopamine jailbreak detection
[Android] Improved emulator detection
[Android] Added support for 16 KB pages
[iOS] Resolved memory-related stability issues
[Android] Removed malware report duplicates
Added interface for screenshot / screen recording blocking on iOS.
Improvements
Added interface for external ID storage.
Added eventId to the logs, which is unique per each log. It allows traceability of the same log across various systems.
[Android] New root detection checks added.
Fixed
[iOS] Resolved an issue with the screen recording detection.
[iOS] Resolved an issue that prevented Xcode tests from running correctly.
Android SDK requires kotlin_version >= 2.0.0
[Android] Compile API increased to 35, dependencies updated
[Android] Internal library obfuscation reworked
[Android] Root detection divided into 2 parts (quick initial checks, and time-demanding asynchronous post checks)
[iOS] Improvement of the obfuscation of the SDK
[iOS] Deep signing of the OpenSSL binaries
[Android] ANR issues bug-fixing
Added screenshot - detection of screenshots, refer to the freeRASP integration documentation.
Added screenRecording - detection of screen recording, refer to the freeRASP integration documentation.
Added blockScreenCapture for FLAG_SECURE control, an active protection against screen capturing.
Added isScreenCaptureBlocked - to receive whether the screen capture is blocked
[Android] Raised Android compileSDK level to 35
[Android] Set minifyEnabled in plugin to true implicitly
[Android] Improved root detection
[Android] Proguard rules to address warnings from okhttp dependency
[Android] Added request integrity information to data collection headers.
[Android] Enhanced and accelerated the data collection logic.
App icons for detected malware are not fetched automatically anymore, which reduces computation required to retrieve malware data. From now on, app icons have to be retrieved using the getAppIcon method.
Parsing of malware data is now async.
[Android] Malware data is now parsed on background thread to improve responsiveness.
[Android] adbEnabled callback, allowing you to detect USB debugging option enabled in the developer settings on the device.
Added configuration fields for malware detection.
[Android] Malware detection as a new callback for enhanced app security.
[Android] Refactoring Magisk checks in the root detection.
[iOS] Enhanced security with Serotonin Jailbreak Detection to identify compromised devices.
Maintenance
[iOS] Updated SDK code signing; it will now be signed with:
Team ID: PBDDS45LQS
Team Name: Lynx SFT s.r.o.
Bug Fix
Resolved compatibilty issues with JDK 21 (issue #21)
[iOS] Renewed the signing certificate.
[Android] Reported ANR issues present on some devices were resolved (GH Flutter issue #138).
[Android] Reported crashes caused by ConcurrentModificationException and NullPointerException were resolved (GH Flutter issue #140).
[Android] Reported crashes caused by the UnsupportedOperationException were resolved.
[Android] False positives for hook detection.
[Android] Added the auditing of the internal execution for the future check optimization and overall security improvements.
[iOS] Dopamine jailbreak detection.
Improved error messages when validation of the freeRASP configuration fails.
Updated CURL to 8.8.0 and OpenSSL to 3.0.14 (Github issue #114).
[Android] Changed the way TalsecConfig is created, we introduced a Builder pattern to make the process more streamlined and readable.
[Android] Refactored fetching the list of installed applications for root and hook detection.
[iOS] Enhanced and accelerated the data collection logic.
[Android] Fixed native crashes (SEGFAULT errors) in ifpip method.
[Android] Fixed collision for command line tools (like ping) invoked without absolute path (Github issue #41).
Added a new threat systemVPN for VPN detection.
[Android] Added a new threat devMode for Developer mode detection.
Updated the CA bundle to enhance security for secure connections.
[Android] Updated the GMS dependency to a newer version for improved performance and compatibility.
[iOS] Passcode check is now performed periodically.
Resolved a problem with displaying the Arabic alphabet in logs caused by the device’s default system locale.
[Android] Updated freeRASP SDK artifact hosting ensuring better stability and availibility.
[iOS] Added Privacy Manifest.
[iOS] Added codesigning for the SDK, it is signed by:
Team ID: ASQC376HCN,
Team Name: AHEAD iTec, s.r.o..
Updated CURL to 8.5.0 and OpenSSL to 1.1.1w.
[Android] Shortened duration of threat evaluation.
[Android] Improved appIntegrity check and its logging.
[iOS] Improved obfuscation of Swift and C strings.
[Android] Fixed a native crash bug during one of the native root checks (detected after NDK upgrade).
[iOS] Fixed memory leak (freeRASP iOS issue #13)
[Android] Fixed bug that prevented firing callbacks in specific situations.
[iOS] Fixed bug that caused app being killed in specific situations (#42).
Curious about more in-depth changes for Capacitor? Head over to our GitHub Changelog for the complete history of updates!