εxodus CLI client for local APK static analysis.
The easiest way to analyze an APK is to use our Docker image.
Simply go to the directory where the APK file is and run:
docker run -v $(pwd):/app --rm -i exodusprivacy/exodus-standalone /app/<your apk file>
Clone this repository:
git clone https://github.com/Exodus-Privacy/exodus-standalone.git
cd exodus-standalone
Install dexdump
:
sudo apt-get install dexdump
Create Python virtualenv
:
sudo apt-get install virtualenv
virtualenv venv -p python3
source venv/bin/activate
Download and install dependencies:
pip install -r requirements.txt
$ ./exodus_analyze.py --help
usage: exodus_analyze.py [-h] [-t] [-j] [-o OUTPUT_FILE] [-i IGNORE] [-e CODE] apk
positional arguments:
apk the apk file to analyse
optional arguments:
-h, --help show this help message and exit
-t, --text print textual report (default)
-j, --json print JSON report
-o OUTPUT_FILE, --output OUTPUT_FILE
store JSON report in file (requires -j option)
-i IGNORE, --ignore IGNORE
comma-separated ids of trackers to ignore
-e CODE, --exit-code CODE
use the CODE instead of trackers counter as exit code if trackers was detected
./exodus_analyze.py my_apk.apk
be sure to activate the Python virtualenv
before running exodus_analyze.py
.
Example:
=== Informations
- APK path: /tmp/tmp1gzosyt4/com.semitan.tan.apk
- APK sum: 8e85737be6911ea817b3b9f6a80290b85befe24ff5f57dc38996874dfde13ba7
- App version: 5.7.0
- App version code: 39
- App name: Tan Network
- App package: com.semitan.tan
- App permissions: 9
- android.permission.INTERNET
- android.permission.ACCESS_NETWORK_STATE
- android.permission.ACCESS_FINE_LOCATION
- android.permission.WRITE_EXTERNAL_STORAGE
- android.permission.READ_PHONE_STATE
- android.permission.VIBRATE
- com.semitan.tan.permission.C2D_MESSAGE
- com.google.android.c2dm.permission.RECEIVE
- android.permission.WAKE_LOCK
- App libraries: 0
=== Found trackers
- Google Analytics
- Google Ads
- Google DoubleClick
./exodus_analyze.py -j [-o report.json] my_apk.apk
be sure to activate the Python virtualenv
before running exodus_analyze.py
.
Example:
{
"trackers": [
{
"id": 70,
"name": "Facebook Share"
},
[...]
],
"apk": {
"path": "com.johnson.nett.apk",
"checksum": "70b6f0d9df432c66351a587df7b65bea160de59e791be420f0e68b2fc435429f"
},
"application": {
"version_code": "15",
"name": "Nett",
"permissions": [
"android.permission.INTERNET",
"android.permission.ACCESS_NETWORK_STATE",
"android.permission.WRITE_EXTERNAL_STORAGE",
"android.permission.READ_PHONE_STATE",
"android.permission.READ_EXTERNAL_STORAGE",
"android.permission.WAKE_LOCK",
"com.google.android.c2dm.permission.RECEIVE",
"com.johnson.nett.permission.C2D_MESSAGE"
],
"version_name": "1.1.12",
"libraries": [],
"handle": "com.johnson.nett"
}
}
This tool uses dexdump
and only provides GNU/Linux x86_64
version of it.
Create config.py
file in the project directory specifying:
CONFIG = {
'username': 'alice',
'password': 'bob',
'host': 'http://localhost:8000'
}
$ ./exodus_download.py --help
usage: exodus_download.py [-h] report_id destination
positional arguments:
report_id the report of the app to download
destination the destination folder
optional arguments:
-h, --help show this help message and exit
be sure to activate the Python virtualenv
before running exodus_download.py
.
./exodus_download.py 15 /tmp/
Successfully logged in
Downloading the APK ...
APK successfully downloaded: /tmp/fr.meteo.apk
You can use εxodus-standalone in your CI pipelines.
Below are listed some examples of how to integrate it.
exodus_scan:
stage: audit
image:
name: exodusprivacy/exodus-standalone:latest
entrypoint: [""]
script:
- /exodus_analyze.py [YOUR_APK_PATH]
steps:
- name: Execute exodus-standalone
uses: docker://exodusprivacy/exodus-standalone:latest
with:
args: /github/workspace/[YOUR_APK_PATH]