FOLLOW FLUID ATTACKS
It is possible to obtain source code of the application because it has not been
obfuscated using a secure mechanism.
This could allow an attacker to understand the inner workings of the
application or get technical or sensitive information.
R159. Obfuscate code
Start with Fluid Attacks
Ready to start?
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.