FOLLOW FLUID ATTACKS
It is possible to obtain source code of the application because it has not been
obfuscated using a secure mechanism.
This could allow an attacker to understand the inner workings of the
application or get technical or sensitive information.
R159. Obfuscate code
Corporate member of The OWASP Foundation
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.