Do’s | Dont’s |
---|---|
Detect compromised environments (rooted/jaibreak) at runtime and react accordingly (Ensure the environment is not tampered with) |
|
Integrity check of the binary (Ensure the app itself is not tampered with) |
|
Verify and check the integrity of dynamic resources (Ensure those resources are not tampered with) |
|
Disable debugging in the application settings (Make sure the app is not debuggable) |
|
Check if the device is in developer mode if supported by platform (Prevent app debugging) |
|
Check if debugger is attached and/or if the process is being traced (Prevent app debugging) |
|
Check lockscreen/passcode is enabled on the device (Make sure device is secure) |
|
Consider blocking access if devices are out of date (Ensure device has no known vulnerabilities) |
This repository was archived by the owner on Apr 17, 2023. It is now read-only.