Closed lfmorales closed 1 year ago
Hello @lfmorales , It's possible the bypass script could disable Frida protection. Thank you for your report, we will check if there is anything we can do about it.
Thank you for using the freeRASP. Let us know if you need anything, Talsec Team
@talsec-app is this issue resolved?
Hi, I've been installing freeRASP inside my Android project (it's a React-native project, but I've inserted freeRASP in order to detect rooted devices, primarily). import com.aheaditec.talsec_security.security.api.Talsec; import com.aheaditec.talsec_security.security.api.TalsecConfig; import com.aheaditec.talsec_security.security.api.ThreatListener;
public class MainApplication extends Application implements ReactApplication, ThreatListener.ThreatDetected { public void onCreate() { super.onCreate(); TalsecConfig config = new TalsecConfig("my.app.id","myAppHash", "luisfelipe.morales@cristalizaservicios.es",null); Talsec.start(this,config); } @Override public void onRootDetected() { System.exit(0); }
@Override public void onDebuggerDetected() { System.exit(0); }
@Override public void onEmulatorDetected() { System.exit(0); }
@Override public void onTamperDetected() { System.exit(0); }
@Override public void onUntrustedInstallationSourceDetected() {
}
@Override public void onHookDetected() { System.exit(0); }
@Override public void onDeviceBindingDetected() { System.exit(0); } } I've tested in an emulator, with Frida, with the script frida --codeshare dzonerzy/fridantiroot -f my.app.id
The result is that I can install and run my app inside the emulator, which is not desired. An I doing something wrong?
Thanks in advance