Open
Description
Our scanners at IzzyOnDroid were just triggered by the new release, and report:
! repo/com.studio4plus.homerplayer_76.apk declares sensitive permission(s): android.permission.READ_EXTERNAL_STORAGE
! repo/com.studio4plus.homerplayer_76.apk contains signature block blobs: 0x504b4453 (DEPENDENCY_INFO_BLOCK; GOOGLE)
I assume the storage permission is to read audio files from whereever on local storage they are located (but what's the WRITE part for then?)? As for DEPENDENCY_INFO_BLOCK
, that can easily be avoided with a small addition to your build.gradle
:
android {
dependenciesInfo {
// Disables dependency metadata when building APKs.
includeInApk = false
// Disables dependency metadata when building Android App Bundles.
includeInBundle = false
}
}
For some background: that BLOB is supposed to be just a binary representation of your app's dependency tree. But as it's encrypted with a public key belonging to Google, only Google can read it – and nobody else can even verify what it really contains. More details can be found e.g. here: Ramping up security: additional APK checks are in place with the IzzyOnDroid repo.
Thanks in advance!
Metadata
Assignees
Labels
No labels
Activity