You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Here is the warning message shared by Data Theorem,
Data Theorem’s mobile analyzer reverse-engineered the App and identified keys, passwords, and/or secrets hardcoded in the App's binaries. These keys/passwords/secrets should never appear in the App and could potentially compromise the security of your data.
and the recommendation (possible solution) for the same,
Remove the identified key, passwords, and/or secrets immediately from the App. Anything compiled into the App’s binaries should be considered public, even if the App is obfuscated. There is no way to guarantee the safety of secrets embedded in Apps; thus, they need to be omitted. If the App depends on the secret to communicate with a backend, consider an authentication model in which each client receives a unique secret. Furthermore, if this issue was found in a production release, the hardcoded secret should be revoked and should never be used again.
So, we wanted to know if this should be considered as a security issue or a false alarm.
The text was updated successfully, but these errors were encountered:
We use Data Theorem for mobile app security. Based on the latest security report for our app, Data Theorem identified
AZURE_AUTHENTICATOR_APP_RELEASE_SIGNATURE
` as a hardcoded secret/password.Here is the warning message shared by Data Theorem,
and the recommendation (possible solution) for the same,
So, we wanted to know if this should be considered as a security issue or a false alarm.
The text was updated successfully, but these errors were encountered: