It is possible to obtain source code of the application because it has not been
obfuscated using a secure mechanism.
This could allow an attacker to understand the inner workings of the
application or get technical or sensitive information.
R159. Obfuscate code
Ready to start with Fluid Attacks?
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.