yusomang / androguard

Automatically exported from code.google.com/p/androguard
Apache License 2.0
0 stars 0 forks source link

TaintedPackage searching error #143

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
What steps will reproduce the problem?
1. ./androlyze.py -s
2. In [1]: a, d, dx = AnalyzeAPK("/home/facebook.apk")
3. show_Path(d, dx.tainted_packages.search_packages("Landroid/telephony/"))

What is the expected output? What do you see instead?
 /home/androguard/androguard/core/analysis/analysis.pyc in show_Path(vm, path)
   1375                                           dst_descriptor)
   1376   else :
-> 1377     if path.get_access_flag() == TAINTED_PACKAGE_CALL :
   1378       src_class_name, src_method_name, src_descriptor =  path.get_src( cm )
   1379       dst_class_name, dst_method_name, dst_descriptor =  path.get_dst( cm )

AttributeError: 'list' object has no attribute 'get_access_flag'

What version of the product are you using? On what operating system?
Androlyze version 2.0

Please provide any additional information below.

Original issue reported on code.google.com by for.teke...@gmail.com on 23 Oct 2013 at 2:59

GoogleCodeExporter commented 8 years ago
on ubuntu server 13.04

Original comment by for.teke...@gmail.com on 23 Oct 2013 at 3:00