(#) com.android.security.lint:lint
Project
: https://github.com/google/android-security-lints
Vendor
: Google - Android 3P Vulnerability Research
Contact
: https://github.com/google/android-security-lints
Feedback
: https://github.com/google/android-security-lints/issues
Min
: Lint 4.1
Compiled
: Lint 8.0 and 8.1
Artifact
: com.android.security.lint:lint:1.0.3
(##) Included Issues
|Issue Id |Issue Description |
|--------------------------------------------------------------------------------|---------------------------------------------------------------------------------|
|[VulnerableCryptoAlgorithm](VulnerableCryptoAlgorithm.md.html) |Application uses vulnerable cryptography algorithms |
|[UnsafeCryptoAlgorithmUsage](UnsafeCryptoAlgorithmUsage.md.html) |Application uses unsafe cipher modes or paddings with cryptographic algorithms |
|[MissingAutoVerifyAttribute](MissingAutoVerifyAttribute.md.html) |Application has custom scheme intent filters with missing `autoVerify` attributes|
|[InsecureDnsSdkLevel](InsecureDnsSdkLevel.md.html) |Application vulnerable to DNS spoofing attacks |
|[StrandhoggVulnerable](StrandhoggVulnerable.md.html) |Application vulnerable to Strandhogg attacks |
|[TapjackingVulnerable](TapjackingVulnerable.md.html) |Application's UI is vulnerable to tapjacking attacks |
|[DefaultCleartextTraffic](DefaultCleartextTraffic.md.html) |Application by default permits cleartext traffic |
|[DefaultTrustedUserCerts](DefaultTrustedUserCerts.md.html) |Application by default trusts user-added CA certificates |
|[UnintendedExposedUrl](UnintendedExposedUrl.md.html) |Application may have a debugging or development URL publicly exposed |
|[UnintendedPrivateIpAddress](UnintendedPrivateIpAddress.md.html) |Application may have a private IP address publicly exposed |
|[ExposedRootPath](ExposedRootPath.md.html) |Application specifies the device root directory |
|[SensitiveExternalPath](SensitiveExternalPath.md.html) |Application may expose sensitive info like PII by storing it in external storage |
|[WeakPrng](WeakPrng.md.html) |Application uses non-cryptographically secure pseudorandom number generators |
|[DisabledAllSafeBrowsing](DisabledAllSafeBrowsing.md.html) |Application has disabled safe browsing for all WebView objects |
|[InsecurePermissionProtectionLevel](InsecurePermissionProtectionLevel.md.html) |Custom permission created with a normal `protectionLevel` |
|[UnsanitizedContentProviderFilename](UnsanitizedContentProviderFilename.md.html)|Trusting ContentProvider filenames without any sanitization |
|[InsecureStickyBroadcastsMethod](InsecureStickyBroadcastsMethod.md.html) |Usage of insecure sticky broadcasts |
|[InsecureStickyBroadcastsPermission](InsecureStickyBroadcastsPermission.md.html)|Usage of insecure sticky broadcasts |
(##) Including
!!!
This is not a built-in check. To include it, add the below dependency
to your project. This lint check is included in the lint documentation,
but the Android team may or may not agree with its recommendations.
```
// build.gradle.kts
lintChecks("com.android.security.lint:lint:1.0.3")
// build.gradle
lintChecks 'com.android.security.lint:lint:1.0.3'
// build.gradle.kts with version catalogs:
lintChecks(libs.com.android.security.lint.lint)
# libs.versions.toml
[versions]
com-android-security-lint-lint = "1.0.3"
[libraries]
# For clarity and text wrapping purposes the following declaration is
# shown split up across lines, but in TOML it needs to be on a single
# line (see https://github.com/toml-lang/toml/issues/516) so adjust
# when pasting into libs.versions.toml:
com-android-security-lint-lint = {
module = "com.android.security.lint:lint",
version.ref = "com-android-security-lint-lint"
}
```
1.0.3 is the version this documentation was generated from;
there may be newer versions available.
(##) Changes
* 1.0.1: First version includes DefaultCleartextTraffic,
DefaultTrustedUserCerts, DisabledAllSafeBrowsing, ExposedRootPath,
InsecureDnsSdkLevel, InsecurePermissionProtectionLevel,
MissingAutoVerifyAttribute, SensitiveExternalPath,
StrandhoggVulnerable, TapjackingVulnerable, UnintendedExposedUrl,
UnintendedPrivateIpAddress, UnsafeCryptoAlgorithmUsage,
VulnerableCryptoAlgorithm, WeakPrng.
* 1.0.2: Adds InsecureStickyBroadcastsMethod,
InsecureStickyBroadcastsPermission,
UnsanitizedFilenameFromContentProvider.
* 1.0.3: Adds UnsanitizedContentProviderFilename. Removes
UnsanitizedFilenameFromContentProvider.
(##) Version Compatibility
There are multiple older versions available of this library:
| Version | Date | Issues | Compatible | Compiled | Requires |
|-------------------:|----------|-------:|------------|--------------:|---------:|
| 1.0.3| | 18| Yes| 8.0 and 8.1|8.0 and 8.1|
| 1.0.2| | 18| Yes| 8.0 and 8.1|8.0 and 8.1|
| 1.0.1| | 15| Yes| 8.0 and 8.1|8.0 and 8.1|