Static Code Analysis:
![]() |
In Android Application static code Analysis: Manually or by tool analyzing or examining the whole code and finding any sensitive data hardcoded in source code or not. Or any vulnerable library used or not not sufficient . Main Role of static code analysis : Understand flow of code.
All automated tool like mobsf , quark do static code analysis but for my point of view manually analysis of static code is best case.
For doing all things manually we have some knowledge of java and android application code structure.
In static Analysis of App code sometimes ago I simply decompile application and open the application decompiled code in jd-gui. And search for any sensitive data like key, token, api_key hardcoded or not.
But really it is worst case of app static code analysis.
I started google search and find a way to analysis app code one by one by using breakpoint in application source code.
I also created an application with the help of that we may analysis any android app by using breakpoints.
https://github.com/effortlessdevsec/Breakpoint-Android
Also I created a simple demo video of an application:
Comments