๐๏ธ Overview
This is the documentation for Android, including
๐๏ธ Hard-Coded Secrets
Why is this important?
๐๏ธ Insecure Configuration
Why is this important?
๐๏ธ Insecure File Management
Why is this important?
๐๏ธ Insecure Network Communication
Why is this important?
๐๏ธ Insecure Processing of Data
This category covers the following issues:
๐๏ธ Insecure Use of Cryptography
Why is this important?
๐๏ธ Insecure Use of Dangerous Function
This vulnerability category covers the following issues:
๐๏ธ Insecure Use of Language/Framework API
Why is this important?
๐๏ธ Insecure Use of SQL Queries
Why is this important?