Skip to content

Feature: Analyze AndroidManifest and Attack Surface#11

Merged
luca-regne merged 4 commits intomainfrom
feat/analyze-manifest
Mar 9, 2026
Merged

Feature: Analyze AndroidManifest and Attack Surface#11
luca-regne merged 4 commits intomainfrom
feat/analyze-manifest

Conversation

@luca-regne
Copy link
Copy Markdown
Owner

No description provided.

Add comprehensive AndroidManifest.xml analysis command that extracts security-relevant information including:
- Package metadata and SDK versions with human-readable labels
- Security flags (debuggable, backup, cleartext traffic, network security config)
- Permissions (declared and requested)
- Component analysis (activities, services, receivers, providers)
- Attack surface calculation highlighting unprotected exported components
- Detailed component tables with export status and permission checks
- Content provider grant URI permission analysis

Key implementation details:
- Extract AppMetadata base model for shared package fields between device and manifest sources
- Use pyaxmlparser to decode binary AndroidManifest.xml from APK
- Compute effectively_exported status based on Android defaults (pre-API 31 behavior)
- Rich terminal output with color-coded risk indicators
- JSON output support for scripting workflows
- Optional component detail flags: --activities, --services, --receivers, --providers, --all-components

This sets the foundation for future session storage by using source-agnostic models.
@luca-regne luca-regne self-assigned this Mar 9, 2026
@luca-regne luca-regne merged commit 39ac78b into main Mar 9, 2026
3 of 4 checks passed
@luca-regne luca-regne deleted the feat/analyze-manifest branch March 9, 2026 20:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant