Deep APK Security Analysis Needed

Заказчик: AI | Опубликовано: 19.01.2026
Бюджет: 750 $

I hold the legal rights to the application in question and need a seasoned Android security engineer to dissect the compiled APK from every angle. Your primary mission is to expose weaknesses—focusing on the obfuscation layer, any hidden or risky execution paths, and the overall internal architecture. Static work will start with JADX (my preferred starting point), yet I am open to you supplementing with tools such as Ghidra, Frida, APKTool, or anything else you trust for thorough reverse-engineering. Dynamic instrumentation is expected so we can confirm findings in a live setting and validate whether any protections trigger under real-world usage. The end result I am looking for is a concise but technically rich deliverable set: • A written report that maps the major modules, classes, and flows, highlighting every obfuscation technique you uncover. • A vulnerability assessment with clear risk ratings and proof-of-concept evidence where feasible. • Actionable recommendations so I can prioritise remediation steps. I will provide the APK only after an NDA is signed; proof of authorisation is ready for you. If you have a solid track record pulling apart protected Android apps and enjoy hunting for subtle security flaws, let’s talk and schedule access.