App and Mobile sandbox integrity protection SDK to combat reverse engineering

I was wonder what App integrity and sandbox breaching protection methods (aka RASP tools) the Ionic devs use to protect the hybrid mobile apps from cloning, tampering, stealing secrets etc.

We (Talsec team) didn’t find anything available to try for free. So we made our freeRASP available for Cordova.

There is a Medium article available for those who would be willing to try it out.

Just curious to know what you guys are actually using to detect threats like rooting, debugger, emulator, Frida hooking, repacking and so on.

Thank you!

2 Likes

Great job, thanks for sharing! :clap:t5:

Where is the capacitor version?

1 Like

Hi syakymchuk,

Using latest talsec 2.0.0
I implemented in our client’s app by following the medium and github steps

In console it show console.log(‘Talsec initialized.’);

But my threatListener callback does not called even in emulator with frida after dynamic script injection
Talsec executes periodical checks not working

What i am doing wrong? can you help?
Anything information you needed?

kindly check the image attached for your reference