Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Device Security Detect #198

Closed
Sig-Bianco opened this issue Jul 10, 2023 · 11 comments
Closed

Device Security Detect #198

Sig-Bianco opened this issue Jul 10, 2023 · 11 comments

Comments

@Sig-Bianco
Copy link

Sig-Bianco commented Jul 10, 2023

Plugin Request

Name: Device Security Detect
Package: @capacitor-community/device-security-detect

Platform(s)

Android, iOS

Existing Solutions

https://github.com/WuglyakBolgoink/cordova-plugin-iroot

Description

The Device Security Detect plugin is designed to provide comprehensive device security detection capabilities for Capacitor-based applications. It aims to detect whether the application is running on an emulator as well as whether the device has been rooted (Android) or jailbroken (iOS). By using this plugin, developers can enhance the security of their applications and take appropriate actions based on the detected security status.

The main features of the Device Security Detect plugin include:

  • Emulator Detection: The plugin utilizes various techniques to identify if the application is running on an emulator or a physical device. This can be useful for preventing unauthorized usage of the application on emulator environments.

  • Root/Jailbreak Detection: The plugin checks for signs of root access on Android devices and jailbreak status on iOS devices. By detecting such modifications, developers can take measures to protect their applications from potential security risks associated with rooted or jailbroken devices.

@Sig-Bianco Sig-Bianco changed the title Device Security Detect" Device Security Detect Jul 10, 2023
@tompsota
Copy link

tompsota commented Sep 8, 2023

Hi @Sig-Bianco,

Maybe you could check out freeRASP (https://github.com/talsec/Free-RASP-Capacitor). We recently added support for Capacitor and based on your description it does exactly what you are looking for. The plugin provides robust device security detection features to help enhance the security of any Capacitor-based application. You can find out more about freeRASP along with the integration manual in the GitHub repo I linked before.
If you have any other question, feel free to ask me directly or open up discussion in our freeRASP Community repo.

Cheers,

Tomas from Talsec

@vaasuvan
Copy link

vaasuvan commented Sep 9, 2024

Still failed in the pentest even after being used ionic capacitor @tompsota

@vaasuvan
Copy link

vaasuvan commented Sep 9, 2024

Any other capacitor plugins to mitigate root detection and ssl bypassing ? @tompsota

@oliveryasuna
Copy link

@vaasuvan I am curious which tests it failed?

@vaasuvan
Copy link

vaasuvan commented Sep 11, 2024 via email

@ryaa
Copy link
Member

ryaa commented Dec 6, 2024

This plugin should be implemented and available soon - see https://github.com/capacitor-community/device-security-detect. Stay tuned :)

@tompsota
Copy link

tompsota commented Dec 8, 2024

Hey @vaasuvan,

yeah it's not surprising that with freeRASP you failed pentest. That's what I'd expect too. Due to the technical aspects of plugins, usually it is not too complicated to just strip off some calls between the SDK and the app.
freeRASP should protect you against simple, brute-force attacks, like repackaging and automated scripts. However, to pass pentest you usually must combine this with another level of protection.
I'd recommend to read more on the following link, if you are still interested: https://docs.talsec.app/freerasp/features-and-pricing-plans/the-key-differences-freerasp-vs.-businessrasp+.
Additionally, there is also a solution providing protection against SSL bypass as well

@ryaa
Copy link
Member

ryaa commented Dec 9, 2024

The initial @capacitor-community/device-security-detect plugin v6.0.0 has been released

@ryaa
Copy link
Member

ryaa commented Dec 9, 2024

I think that this issue can be closed, unless there are any objections. thank you

@Sig-Bianco
Copy link
Author

The request has been completed and implemented in the following plugin: @capacitor-community/device-security-detect

@oliveryasuna
Copy link

Hi Oliver, I used this plugin for ionic capacitors project but not resolved yet please 🙏 tell me what are hooks methods used for rooted devices and jailbreak devices. Still failing when i test after implementation. Please Thank you Best regards Wasu

On Wed, 11 Sep 2024 at 10:01 AM, Oliver Yasuna @.> wrote: @vaasuvan https://github.com/vaasuvan I am curious which tests it failed? — Reply to this email directly, view it on GitHub <#198 (comment)>, or unsubscribe https://github.com/notifications/unsubscribe-auth/ANVOBIEKNZCMAEBGCR4AGATZV6QBFAVCNFSM6AAAAABN4XOBGKVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGNBSGQ3DMNRRGM . You are receiving this because you were mentioned.Message ID: @.>

Thanks. I was actually asking what tests you and your company run?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants