Securing android apps with safe to run

If you’re just after the link:

Health warning

No library or app can guarantee not running on a rooted phone because of the nature of rooted phones, and any tamper detection could be removed or changed in reality — this app should work with most attackers, and make it hard enough to make it not worth it for many others.


The library is intended to provide a layer of security for Android applications from rooted phones, reverse engineering, binary modification, malicious apps and some security vulnerabilities.

In principle, you set the parameters for a safe device, (one where the debugger is not attached, one with a minimum OS version, one not rooted etc) and ask ‘is it safe to run’.

You know best the time and place to ask the question-maybe you do it on app launch and throw an exception, maybe you ask when some tries to make a payment to someone else and reject the payment or maybe you do it before retrieving some data from the backend.


We have the following checks that are configurable in safe to run

  • Signature checks — check the signature of the binary (set multiple for multiple certs)
  • Debug check — check if the debugger is attached or if the app is debuggable
  • Device check — blacklist a combination of OS version and device manufacturer
  • Root check — check for signs which point to the device being rooted
  • Other packages check — check for the presence of other packages, e.g. You might not want to run if you know a specific app is running because it’s known malware that might attack your app
  • Install origin check — check for the installing package of your app, this can help to make reverse engineering harder

Sample usage

Every time you want to run a check execute:





Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

WhatsApp Clone — Jetpack Compose

Generate a Random Color on Button Click — Android Studio

What is kotlin Koin? How to use Kotlin Koin in android?

What to do if you lose the Android signing key?

Jetpack Compose and the fall of Fragments

ViewBinding — Made easy with the power of Kotlin & Generics.

Error inflating class com.facebook.login.widget.LoginButton on FacebookSdk 5.8.0

Exploring Native Functions with Frida on Android — part 4

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Daniel Llewellyn

Daniel Llewellyn

More from Medium

Beetlebug — A Vulnerable Android CTF App

Implementing TLS Certificate Checking in Android Apps

Building Android App Bundle with Jenkins

Firebase Remote Config for app updates in Android