<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mahere Fluxera</title>
    <description>The latest articles on DEV Community by Mahere Fluxera (@mahere_marley_25462f7cf9e).</description>
    <link>https://dev.to/mahere_marley_25462f7cf9e</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3897414%2Fbfc22c11-6b87-42ab-bf97-f9eb5c813c3b.png</url>
      <title>DEV Community: Mahere Fluxera</title>
      <link>https://dev.to/mahere_marley_25462f7cf9e</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mahere_marley_25462f7cf9e"/>
    <language>en</language>
    <item>
      <title>How I Built a Static APK Analyzer That Detects Hidden Tracker SDKs in Android Apps, APK integrity checks, and what 3,745 real scans revealed.</title>
      <dc:creator>Mahere Fluxera</dc:creator>
      <pubDate>Sat, 16 May 2026 14:48:37 +0000</pubDate>
      <link>https://dev.to/mahere_marley_25462f7cf9e/how-i-built-a-static-apk-analyzer-that-detects-hidden-tracker-sdks-in-android-apps-apk-integrity-5fb1</link>
      <guid>https://dev.to/mahere_marley_25462f7cf9e/how-i-built-a-static-apk-analyzer-that-detects-hidden-tracker-sdks-in-android-apps-apk-integrity-5fb1</guid>
      <description>&lt;p&gt;&lt;strong&gt;Google Play has a Data Safety section. Developers fill it out themselves. Nobody verifies it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A Mozilla study from 2023 found that over 80% of privacy labels on the Play Store are inaccurate or incomplete. The same conclusion came from Oxford in 2018 and MIT researchers since. There is no penalty for a developer who lies about data collection. The label is a checkbox exercise.&lt;br&gt;
That is the problem &lt;a href="https://play.google.com/store/apps/details?id=com.appxpose.app&amp;amp;referrer=ref_apitest" rel="noopener noreferrer"&gt;AppXpose&lt;/a&gt; was built to solve.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Technical Problem&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most privacy tools work at the network level. They monitor traffic, block domains, or analyze behavior at runtime. That approach has real value but it also has a fundamental limitation: it only catches what an app does while you are watching.&lt;br&gt;
Static APK analysis takes a different approach. Instead of watching what an app does, it reads what an app contains.&lt;br&gt;
An APK is a ZIP archive. Inside it are DEX files — Dalvik Executable format, the compiled bytecode that Android runs. DEX files contain all the class names from the app's Java and Kotlin source code.&lt;br&gt;
Here is the insight: you do not need to decompile or reverse-engineer anything to identify third-party SDKs. Class names follow predictable package naming conventions. com.google.firebase.analytics is Firebase Analytics. com.appsflyer.internal is AppsFlyer. com.facebook.ads is Meta Audience Network.&lt;br&gt;
You can identify embedded SDKs just by reading class name prefixes. No decompilation. No dynamic analysis. Just string matching against a signature database.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Building the Signature Database&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;AppXpose currently has 174 tracker SDK signatures from two sources.&lt;br&gt;
About 80 signatures come from Exodus Privacy, an open-source tracker database licensed under ODbL. These are the well-known ones: Google Analytics, Firebase, AdMob, Crashlytics, AppsFlyer, Adjust.&lt;br&gt;
The remaining signatures come from original research and a community discovery pipeline.&lt;br&gt;
The community discovery pipeline works like this: when AppXpose scans an app and finds class prefixes that do not match any known signature, those prefixes are reported anonymously to a server. When the same unknown prefix appears in three or more distinct apps, it gets flagged for investigation. Confirmed signatures are pushed to all devices via a daily sync without requiring an app update.&lt;br&gt;
This means the detection engine improves passively with every scan in the corpus. No crowdsourced effort required. It just accumulates.&lt;br&gt;
The 13 tracker categories are: Analytics, Ads, Attribution, Crash Reporting, Social, Push, Payment, Location, Support, Authentication, Experimentation, Deep Linking, and Unknown.&lt;br&gt;
Unknown is the most interesting category. More on that below.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Matching Engine&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The core matching logic is simpler than it sounds.&lt;br&gt;
For each installed app, AppXpose extracts all DEX class names using PackageManager and a custom DEX parser. It applies a 30MB cap to avoid OOM on large apps. Multi-DEX is handled natively.&lt;br&gt;
Class names are then matched against the signature database using prefix matching. com.google.firebase.analytics.FirebaseAnalytics matches the prefix com.google.firebase.analytics.&lt;br&gt;
Two deduplication layers prevent inflation:&lt;br&gt;
First, sub-package deduplication collapses child packages into the parent SDK. If you have both com.google.firebase.analytics and com.google.firebase.analytics.connector detected, only one SDK is counted.&lt;br&gt;
Second, an SDK subsumption map handles transitive dependencies. Firebase is bundled automatically when you add AdMob. Counting both would be misleading. The subsumption map knows which SDKs are typically bundled together and collapses them.&lt;br&gt;
Per-batch sizing handles large APKs: apps over 100MB scan in batches of 2, smaller apps in batches of 4. This prevents ANR on constrained devices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;APK Integrity Checks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Beyond tracker detection, AppXpose runs five deterministic integrity checks against each APK.&lt;br&gt;
DEX header fingerprint: checks for non-standard header sizes, endianness anomalies, and checksum mismatches. Legitimate Play Store apps have clean DEX headers. Repackaged or tampered APKs often do not.&lt;br&gt;
Suspicious file entries: searches for known hooking framework artifacts — Frida server binaries, Xposed framework files, Cydia Substrate signatures, LSPosed/Whale hooking libraries, root binaries like su and busybox, debugging tools like gdbserver. Also checks for repackaging indicators like classes_patched.dex.&lt;br&gt;
Signing block shape: analyzes the APK signature block structure. APKs stripped of their v2/v3 signatures and re-signed with a different key show characteristic anomalies here.&lt;br&gt;
Native library presence: flags native libraries associated with hooking or surveillance tools.&lt;br&gt;
Multiple DEX detection: counts DEX files. Unusual counts relative to app size can indicate modification.&lt;br&gt;
A real example from our corpus: com.mmaa.narasarangapp flagged HIGH for AppGuard Packer. The scan found assets/appguard/sign.crt and assets/appguard/sign.mf inside the APK. AppGuard is a Korean code obfuscation tool used to hide what the app does from static analysis. A legitimate app has no reason to use it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What the Data Shows After 3,745 Scans&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The corpus has accumulated some clear patterns.&lt;br&gt;
Finance apps average 13.5 tracker SDKs per app. The category handling your most sensitive data is the most aggressive tracker category in the corpus.&lt;br&gt;
1 in 7 apps scores HIGH or CRITICAL risk.&lt;br&gt;
The Unknown SDK category averages 6.6 trackers per app. That is three times higher than the Ads category. These are unrecognized packages being actively investigated through the community discovery pipeline. The fact that unrecognized SDKs show up so frequently across so many apps suggests there is a long tail of tracking infrastructure that has not been catalogued yet.&lt;br&gt;
Some specific findings: Match Masters contains 41 embedded tracker SDKs. An app called "AI Browser - Safe &amp;amp; Fast" contains 30 trackers and scores HIGH risk.&lt;br&gt;
The full dataset is available at &lt;a href="https://appxpose.app/research" rel="noopener noreferrer"&gt;appxpose.app/research&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What I Would Do Differently&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Starting with static analysis was the right call. I considered dynamic analysis early on but the complexity of instrumenting a runtime, handling obfuscation, and dealing with apps that behave differently under observation made static analysis a much more tractable starting point.&lt;br&gt;
The community discovery pipeline was the best architectural decision. Passive improvement without user effort is hard to replicate with any other approach.&lt;br&gt;
The AI risk analysis using Claude Haiku for the summary and score blending works better than I expected. The prompt engineering to get consistent, calibrated scores took iteration but the results are genuinely useful.&lt;br&gt;
What I underestimated: the gap between what permissions an app declares and what it actively uses at runtime. Declared permissions inflate some findings. This is a known limitation of static analysis and worth being explicit about.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Open Questions&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;How do you handle aggressive class name obfuscation? Some apps rename everything to single characters. Prefix matching breaks entirely on these.&lt;br&gt;
How do you distinguish a permission declared because an SDK requires it versus one the app actually uses? This requires dynamic analysis to answer properly.&lt;br&gt;
How do you scale the signature database beyond 174 entries while keeping false positive rates acceptable? More signatures mean more potential for incorrect matches on classes that happen to share a prefix.&lt;br&gt;
If you are working on similar problems or have thoughts on any of these, I am happy to talk through it in the comments.&lt;br&gt;
The full methodology is at &lt;a href="https://appxpose.app/how-it-works" rel="noopener noreferrer"&gt;appxpose.app/how-it-works.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;AppXpose is free on Google Play. The research corpus data is public at &lt;a href="https://appxpose.app/" rel="noopener noreferrer"&gt;appxpose.app&lt;/a&gt;&lt;/p&gt;

</description>
      <category>android</category>
      <category>kotlin</category>
      <category>privacy</category>
      <category>security</category>
    </item>
    <item>
      <title>From factory worker to 2,000+ installs - what actually worked</title>
      <dc:creator>Mahere Fluxera</dc:creator>
      <pubDate>Sat, 25 Apr 2026 11:08:34 +0000</pubDate>
      <link>https://dev.to/mahere_marley_25462f7cf9e/from-factory-worker-to-2000-installs-what-actually-worked-4ng3</link>
      <guid>https://dev.to/mahere_marley_25462f7cf9e/from-factory-worker-to-2000-installs-what-actually-worked-4ng3</guid>
      <description>&lt;p&gt;I'm not a CS graduate. I didn't go to a bootcamp. &lt;br&gt;
Two years ago I was working in a factory.&lt;/p&gt;

&lt;p&gt;Today I have an Android app on the Play Store with 2,000+ installs, &lt;br&gt;
4.6 stars, and users in 5 languages.&lt;/p&gt;

&lt;p&gt;Here's what actually moved the needle:&lt;/p&gt;

&lt;h2&gt;
  
  
  What didn't work
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Product Hunt launch → 1 upvote (the community needs warming up weeks before — I didn't know that)&lt;/li&gt;
&lt;li&gt;Google Ads → too expensive without clear conversion data&lt;/li&gt;
&lt;li&gt;Reddit → got removed from subreddits for "quality reasons" even with genuine content&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What did work
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Posting real scan findings of apps like Binance, PayPal, WhatsApp — people care when it's data they recognize&lt;/li&gt;
&lt;li&gt;One post hit 7K+ views and users started mentioning AppXpose in comments organically — without me asking&lt;/li&gt;
&lt;li&gt;Adding Spanish support after noticing Spanish-speaking users downloading — small move, big signal&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The app
&lt;/h2&gt;

&lt;p&gt;AppXpose scans Android apps for hidden trackers, risky permissions, GDPR flags, and generates a Breach Risk Score. No other app combines all four in plain English for regular users.&lt;/p&gt;

&lt;h2&gt;
  
  
  Current status
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;2,000+ installs, 31 reviews, 4.6 stars&lt;/li&gt;
&lt;li&gt;Free tier: 5 scans/week&lt;/li&gt;
&lt;li&gt;Pro Lifetime: €4.49&lt;/li&gt;
&lt;li&gt;GUARD subscription with breach alerts: €39.99/year&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Still figuring a lot out. Happy to answer questions about Android development, ASO, or bootstrapping solo.&lt;/p&gt;

</description>
      <category>android</category>
      <category>privacy</category>
      <category>startup</category>
      <category>security</category>
    </item>
  </channel>
</rss>
