0/63

Threat

com.parallel.space.lite

Parallel Space Lite

Analyzed on 2021-08-17T17:41:25.158420

150

permissions

200

activities

68

services

7

receivers

33

domains

File sums

MD5 3f3daeb649770c095e05a6c7a7931736
SHA1 4e7a2ccf9f4cdb47fd755ba8510376773a80313e
SHA256 29cbf0e42ae7ec48c248d737b1678546cf693f02c5645dbdeab997ad06326220
Size 10.41MB

APKiD

Information computed with APKiD.

/tmp/tmpuv6647z5!classes.dex
yara_issue
  • yara issue - dex file recognized by apkid but not yara module
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • possible Build.SERIAL check
  • SIM operator check
  • network operator name check
  • subscriber ID check
  • possible VM check
compiler
  • unknown (please file detection issue!)
/tmp/tmpuv6647z5!classes2.dex
yara_issue
  • yara issue - dex file recognized by apkid but not yara module
anti_vm
  • Build.FINGERPRINT check
  • Build.MANUFACTURER check
  • possible Build.SERIAL check
  • SIM operator check
  • network operator name check
  • device ID check
  • ro.kernel.qemu check
  • possible ro.secure check
compiler
  • unknown (please file detection issue!)

SSdeep

Information computed with ssdeep.

APK file 196608:mjcke65YNIDXYjplC0srDRcdne9UcGWasEhIGzaka84locqfcus5aQzbfCVaYaR:mDPiWXg3C0srVcdneFGF2koocqi5aQfp
Manifest 3072:csUjatL1v1XgBuLefUjx2WkC/V5wAz/0eSz4tQt7tIW1bVjaSa3c3XLH3Gx2Xp/T…
classes.dex 49152:X6Uuj7BpGKBKfeeVmyZEiwjdWFkNd8cRPnE9ylLXBirdVHWQezCFNAf8:1ujFxt…
classes2.dex 49152:S5xGV0VLMCw15poVOnS28WYIF4S6ccs7BC:SbIFJDYIF4hmBC

Dexofuzzy

Information computed with Dexofuzzy.

classes.dex None
classes2.dex None

APK details

Information computed with AndroGuard and Pithus.

Package com.parallel.space.lite
App name Parallel Space Lite
Version name 4.0.9035
Version code 10837
SDK 28 - 28
UAID 9b9844d5bc132b80225e03b280c4e81f6d2fb9ee
Signature Signature V1
Frosting Frosted
Blocks found within V2 signature:
  • 0x2146444e: Google metadata

Certificate details

Information computed with AndroGuard.

MD5 c2dd6389d874e606b4eb352bb3bb882f
SHA1 1e16aa4a024963798a4805c4ca5d35444174a6c7
SHA256 77259aefa78be83b99f3cec4b65d6001e582537b7533543e3d89395f4ff7aa78
Issuer Common Name: ps, Organizational Unit: ps, Organization: ps, Locality: ps, State/Province: ps, Country: ps
Not before 2017-02-20T13:46:16+00:00
Not after 2042-02-14T13:46:16+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. assets/lbesec.pem

Manifest analysis

Information computed with MobSF.

High Clear text traffic is Enabled For App[android:usesCleartextTraffic=true]
The app intends to use cleartext network traffic, such as cleartext HTTP, FTP stacks, DownloadManager, and MediaPlayer. The default value for apps that target API level 27 or lower is "true". Apps that target API level 28 or higher default to "false". The key reason for avoiding cleartext traffic is the lack of confidentiality, authenticity, and protections against tampering; a network attacker can eavesdrop on transmitted data and also modify it without being detected.
Low Content Provider (com.lbe.parallel.sdk.SDKProvider) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.parallel.space.lite.permission.SDK_PROVIDER
protectionLevel: signatureOrSystem [android:exported=true]
A Content Provider is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.lockscreen.LockScreenActivityImpl)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.lockscreen.KeyguardDismissActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.cleaner.CleanAssistantActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.ui.cleaner.CleanAssistantActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.cleaner.CleanResultActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.CloneInstallGuideActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.ui.HomeActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity (com.lbe.parallel.ui.FeedbackActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.manager.NotificationManagementActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.service.statusbar.viewer.DANotificationPanel)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.service.statusbar.viewer.DANotificationPanel) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.lbe.parallel.ui.ShortcutActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.ExitMiddlewareActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.middleware.MiddlewareAdActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.ads.exit.AppExitAdActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.ui.ads.exit.AppExitAdActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.install.GooglePlayForwardActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.LaunchDelegateActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.ui.LaunchDelegateActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher19) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher18) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher17) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher16) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher15) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher14) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher13) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher12) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher11) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher10) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher9) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher8) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher7) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher6) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher5) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher4) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher3) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher2) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher1) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (com.lbe.parallel.AppShortcutLauncher0) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.lbe.parallel.ui.SettingsActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.lbe.parallel.ui.SpeedModeSettingsActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.lbe.parallel.ui.GestureSettingsActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.lbe.parallel.ui.keyguard.KeyguardSettingActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.lbe.parallel.ui.keyguard.KeyguardSetLockActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.keyguard.KeyguardConfirmActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.ui.keyguard.KeyguardConfirmActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.ShareProxyActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity-Alias (parallel.share_remain.apps) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (parallel.share_com.instagram.android) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (parallel.share_com.facebook.katana) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity-Alias (parallel.share_com.tencent.mm) is not Protected. [android:exported=true]
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.NotificationProxyActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.ui.NotificationProxyActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.PromptDialogActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.ui.ThemeApplyActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.browser.BrowserActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.ui.browser.BrowserActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.browser.bookmarks.BookMarksActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.browser.bookmarks.HistoryActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.browser.share.ShareImageActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.browser.BrowserSettingActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.ui.browser.BrowserSettingActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.lbe.parallel.ui.CloneAndIncognitoInstallActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.operatingcenter.OperatingContentDetailsActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.theme.ps.PsThemeGuideActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.ui.theme.ps.PsThemeApplyActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.share.SNSInviteActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.lockscreen.NotificationAccessGuideActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.lockscreen.AccessNotificationSettingActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.parallel.ui.lockscreen.AccessNotificationSettingActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity (com.lbe.parallel.ui.SmartLockSettingsActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.lbe.parallel.ui.lockscreen.SmartLockGuideActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.billing.BillingActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.mopub.mobileads.MoPubActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.mopub.mobileads.MraidActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.mopub.common.MoPubBrowser)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.ui.house.activity.GooglePlayForwardActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.lbe.parallel.widgets.EngineFloatDialogActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Broadcast Receiver (com.appsflyer.MultipleInstallBroadcastReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.lbe.parallel.receiver.PackageInstallReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.lbe.parallel.receiver.PsThemeReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.lbe.parallel.receiver.HouseDownloadReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Service (com.lbe.parallel.service.ThemeApplyService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.lbe.parallel.ui.lockscreen.NotificationObserverService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_NOTIFICATION_LISTENER_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.lbe.doubleagent.service.proxy.SystemBroadcastReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.service.proxy.ChooserActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.service.proxy.ChooserActivity) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.service.account.ChooseTypeAndAccountActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.service.account.ChooseTypeAndAccountActivity) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.service.account.ChooseAccountTypeActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.service.account.ChooseAccountTypeActivity) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.service.account.AddAccountSettings)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.service.account.AddAccountSettings) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.service.proxy.PendingIntentActivityProxy)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.service.proxy.PendingIntentActivityProxy) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.service.proxy.ShortcutProxy)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.service.proxy.ShortcutProxy) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.service.proxy.NotificationProxyActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.service.proxy.NotificationProxyActivity) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.lbe.doubleagent.service.proxy.PendingIntentReceiverProxy) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.service.proxy.PendingIntentServiceProxy) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.service.proxy.KeepAliveService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.service.proxy.ServiceNotificationRemover) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.service.proxy.AdvertisingIdService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.service.plugin.PluginControllerProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.lbe.mdremote.service.DAServiceProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.lbe.doubleagent.service.proxy.ContentProviderProxy) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.lbe.doubleagent.service.proxy.InitializeProvider) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.service.proxy.ContentProviderDelegate) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P0)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P0) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P1)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P1) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P2)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P2) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P3)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P3) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P4)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P4) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P5)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P5) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P6)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P6) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P7)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P7) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P8)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P8) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P9)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P9) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P10)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P10) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P11)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P11) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P12)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P12) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P13)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P13) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P14)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P14) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P15)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P15) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P16)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P16) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P17)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P17) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P18)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P18) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P19)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P19) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P20)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P20) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P21)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P21) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P22)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P22) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P23)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P23) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P24)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P24) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P25)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P25) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P26)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P26) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P27)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P27) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P28)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P28) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P29)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P29) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P30)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P30) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P31)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P31) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P32)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P32) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P33)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P33) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P34)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P34) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P35)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P35) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P36)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P36) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P37)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P37) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P38)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P38) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P39)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P39) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P40)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P40) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P41)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P41) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P42)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P42) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P43)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P43) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P44)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P44) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P45)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P45) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P46)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P46) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P47)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P47) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P48)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P48) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.ActivityProxy$P49)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.ActivityProxy$P49) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P0)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P0) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P1)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P1) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P2)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P2) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P3)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P3) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P4)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P4) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P5)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P5) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P6)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P6) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P7)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P7) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P8)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P8) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P9)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P9) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P10)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P10) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P11)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P11) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P12)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P12) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P13)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P13) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P14)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P14) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P15)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P15) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P16)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P16) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P17)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P17) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P18)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P18) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P19)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P19) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P20)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P20) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P21)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P21) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P22)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P22) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P23)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P23) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P24)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P24) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P25)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P25) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P26)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P26) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P27)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P27) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P28)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P28) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P29)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P29) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P30)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P30) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P31)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P31) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P32)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P32) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P33)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P33) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P34)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P34) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P35)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P35) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P36)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P36) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P37)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P37) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P38)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P38) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P39)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P39) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P40)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P40) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P41)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P41) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P42)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P42) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P43)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P43) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P44)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P44) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P45)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P45) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P46)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P46) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P47)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P47) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P48)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P48) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.lbe.doubleagent.client.proxy.DialogProxy$P49)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.lbe.doubleagent.client.proxy.DialogProxy$P49) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P0) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P1) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P2) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P3) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P4) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P5) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P6) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P7) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P8) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P9) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P10) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P11) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P12) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P13) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P14) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P15) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P16) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P17) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P18) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P19) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P20) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P21) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P22) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P23) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P24) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P25) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P26) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P27) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P28) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P29) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P30) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P31) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P32) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P33) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P34) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P35) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P36) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P37) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P38) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P39) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P40) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P41) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P42) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P43) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P44) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P45) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P46) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P47) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P48) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.lbe.doubleagent.client.proxy.ServiceProxy$P49) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P0) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P1) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P2) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P3) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P4) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P5) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P6) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P7) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P8) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P9) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P10) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P11) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P12) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P13) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P14) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P15) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P16) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P17) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P18) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P19) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P20) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P21) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P22) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P23) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P24) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P25) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P26) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P27) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P28) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P29) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P30) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P31) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P32) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P33) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P34) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P35) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P36) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P37) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P38) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P39) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P40) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P41) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P42) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P43) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P44) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P45) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P46) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P47) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P48) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.lbe.doubleagent.client.proxy.ProviderProxy$P49) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.lbe.parallel_intl.helper [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.virgo.ads.internal.InsertAdActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Service (com.google.android.gms.auth.api.signin.RevocationBoundService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
Medium High Intent Priority (1000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.

Main Activity

Information computed with AndroGuard.

['com.lbe.parallel.ui.tour.SplashActivity', 'com.lbe.parallel.ui.SkinActivity', 'com.lbe.parallel.ui.lockscreen.LockScreenActivityImpl', 'com.lbe.parallel.ui.lockscreen.KeyguardDismissActivity', 'com.lbe.parallel.ui.tour.NewGuideTourActivity', 'com.lbe.parallel.ui.cleaner.CleanAssistantActivity', 'com.lbe.parallel.ui.cleaner.CleanResultActivity', 'com.lbe.parallel.ui.IncognitoInstallGuideActivity', 'com.lbe.parallel.ui.CloneInstallGuideActivity', 'com.lbe.parallel.ui.tour.RatingGuideActivity', 'com.lbe.parallel.ui.tour.GestureGuideActivity', 'com.lbe.parallel.ui.HomeActivity', 'com.lbe.parallel.ui.AboutActivity', 'com.lbe.parallel.ui.volunteer.VolunteerActivity', 'com.lbe.parallel.ui.SpecialThanksActivity', 'com.lbe.parallel.ui.FeedbackActivity', 'com.lbe.parallel.ui.RaiderActivity', 'com.lbe.parallel.ui.manager.TaskManagerActivity', 'com.lbe.parallel.ui.OptimizerWhiteActivity', 'com.lbe.parallel.ui.manager.StorageManagementActivity', 'com.lbe.parallel.ui.manager.NotificationManagementActivity', 'com.lbe.parallel.service.statusbar.viewer.DANotificationPanel', 'com.lbe.parallel.ui.manager.AppInfoActivity', 'com.lbe.parallel.ui.ShortcutActivity', 'com.lbe.parallel.ui.GoogleServicesActivity', 'com.lbe.parallel.ui.MiddlewareActivity', 'com.lbe.parallel.ui.ExitMiddlewareActivity', 'com.lbe.parallel.ui.middleware.MiddlewareAdActivity', 'com.lbe.parallel.ui.ads.exit.AppExitAdActivity', 'com.lbe.parallel.ui.install.GooglePlayForwardActivity', 'com.lbe.parallel.ui.share.ShareActivity', 'com.lbe.parallel.ui.LaunchDelegateActivity', 'com.lbe.parallel.ui.SettingsActivity', 'com.lbe.parallel.ui.SpeedModeSettingsActivity', 'com.lbe.parallel.ui.GestureSettingsActivity', 'com.lbe.parallel.ui.keyguard.KeyguardSettingActivity', 'com.lbe.parallel.ui.keyguard.KeyguardSetLockActivity', 'com.lbe.parallel.ui.keyguard.KeyguardConfirmActivity', 'com.lbe.parallel.ui.ShareProxyActivity', 'com.lbe.parallel.ui.NotificationProxyActivity', 'com.lbe.parallel.ui.NotificationDummyActivity', 'com.lbe.parallel.ui.upgrade.UpgradeDialogActivity', 'com.lbe.parallel.ui.PromptDialogActivity', 'com.lbe.parallel.ui.ThemeApplyActivity', 'com.lbe.parallel.ui.BrowserGuideActivity', 'com.lbe.parallel.ui.browser.BrowserActivity', 'com.lbe.parallel.ui.SpeedModeTourGuideActivity', 'com.lbe.parallel.ui.theme.ThemePreviewActivity', 'com.lbe.parallel.ui.proxy.ProxyConnectionActivity', 'com.lbe.parallel.ui.proxy.PayDialogActivity', 'com.lbe.parallel.ui.theme.ThemeActivity', 'com.lbe.parallel.ui.browser.bookmarks.BookMarksActivity', 'com.lbe.parallel.ui.browser.bookmarks.HistoryActivity', 'com.lbe.parallel.ui.browser.share.ShareImageActivity', 'com.lbe.parallel.ui.browser.BrowserSettingActivity', 'com.lbe.parallel.ui.CloneAndIncognitoInstallActivity', 'com.lbe.parallel.test.IntentTestActivity', 'com.lbe.parallel.ui.operatingcenter.OperatingContentDetailsActivity', 'com.lbe.parallel.ui.settings.Device64bitSupportActivity', 'com.lbe.parallel.ui.theme.ps.PsThemeActivity', 'com.lbe.parallel.ui.theme.ps.PsThemeGuideActivity', 'com.lbe.parallel.ui.theme.ps.PsThemeApplyActivity', 'com.lbe.parallel.ui.share.SNSInviteActivity', 'com.lbe.parallel.ui.lockscreen.NotificationAccessGuideActivity', 'com.lbe.parallel.ui.lockscreen.AccessNotificationSettingActivity', 'com.lbe.parallel.ui.SmartLockSettingsActivity', 'com.lbe.parallel.ui.lockscreen.SmartLockGuideActivity', 'com.lbe.parallel.ui.billing.BillingActivity', 'com.google.android.gms.ads.AdActivity', 'com.mopub.mobileads.MoPubActivity', 'com.mopub.mobileads.MraidActivity', 'com.mopub.common.MoPubBrowser', 'com.mopub.mobileads.MraidVideoPlayerActivity', 'com.lbe.parallel.ui.house.activity.HouseWebActivity', 'com.lbe.parallel.ui.house.activity.AppFamilyActivity', 'com.lbe.parallel.ui.lockscreen.SmartLockInstallActivity', 'com.lbe.parallel.ui.house.activity.GooglePlayForwardActivity', 'com.android.billingclient.api.ProxyBillingActivity', 'com.lbe.parallel.widgets.FloatDialogActivity', 'com.lbe.parallel.widgets.EngineFloatDialogActivity', 'com.lbe.parallel.ui.house.activity.PSCInvitationActivity', 'com.lbe.parallel.ui.permission.PermissionActivity', 'com.lbe.parallel.ui.permission.PermissionGuideActivity', 'com.lbe.parallel.ui.SecondaryLaunchGuideActivity', 'com.lbe.parallel.ui.VivoPowerTutorialActivity', 'com.lbe.doubleagent.service.proxy.ChooserActivity', 'com.lbe.doubleagent.service.account.ChooseTypeAndAccountActivity', 'com.lbe.doubleagent.service.account.ChooseAccountTypeActivity', 'com.lbe.doubleagent.service.account.AddAccountSettings', 'com.lbe.doubleagent.service.proxy.PendingIntentActivityProxy', 'com.lbe.doubleagent.service.proxy.ShortcutProxy', 'com.lbe.doubleagent.service.proxy.NotificationProxyActivity', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P0', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P1', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P2', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P3', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P4', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P5', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P6', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P7', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P8', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P9', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P10', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P11', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P12', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P13', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P14', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P15', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P16', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P17', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P18', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P19', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P20', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P21', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P22', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P23', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P24', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P25', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P26', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P27', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P28', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P29', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P30', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P31', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P32', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P33', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P34', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P35', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P36', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P37', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P38', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P39', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P40', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P41', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P42', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P43', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P44', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P45', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P46', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P47', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P48', 'com.lbe.doubleagent.client.proxy.ActivityProxy$P49', 'com.lbe.doubleagent.client.proxy.DialogProxy$P0', 'com.lbe.doubleagent.client.proxy.DialogProxy$P1', 'com.lbe.doubleagent.client.proxy.DialogProxy$P2', 'com.lbe.doubleagent.client.proxy.DialogProxy$P3', 'com.lbe.doubleagent.client.proxy.DialogProxy$P4', 'com.lbe.doubleagent.client.proxy.DialogProxy$P5', 'com.lbe.doubleagent.client.proxy.DialogProxy$P6', 'com.lbe.doubleagent.client.proxy.DialogProxy$P7', 'com.lbe.doubleagent.client.proxy.DialogProxy$P8', 'com.lbe.doubleagent.client.proxy.DialogProxy$P9', 'com.lbe.doubleagent.client.proxy.DialogProxy$P10', 'com.lbe.doubleagent.client.proxy.DialogProxy$P11', 'com.lbe.doubleagent.client.proxy.DialogProxy$P12', 'com.lbe.doubleagent.client.proxy.DialogProxy$P13', 'com.lbe.doubleagent.client.proxy.DialogProxy$P14', 'com.lbe.doubleagent.client.proxy.DialogProxy$P15', 'com.lbe.doubleagent.client.proxy.DialogProxy$P16', 'com.lbe.doubleagent.client.proxy.DialogProxy$P17', 'com.lbe.doubleagent.client.proxy.DialogProxy$P18', 'com.lbe.doubleagent.client.proxy.DialogProxy$P19', 'com.lbe.doubleagent.client.proxy.DialogProxy$P20', 'com.lbe.doubleagent.client.proxy.DialogProxy$P21', 'com.lbe.doubleagent.client.proxy.DialogProxy$P22', 'com.lbe.doubleagent.client.proxy.DialogProxy$P23', 'com.lbe.doubleagent.client.proxy.DialogProxy$P24', 'com.lbe.doubleagent.client.proxy.DialogProxy$P25', 'com.lbe.doubleagent.client.proxy.DialogProxy$P26', 'com.lbe.doubleagent.client.proxy.DialogProxy$P27', 'com.lbe.doubleagent.client.proxy.DialogProxy$P28', 'com.lbe.doubleagent.client.proxy.DialogProxy$P29', 'com.lbe.doubleagent.client.proxy.DialogProxy$P30', 'com.lbe.doubleagent.client.proxy.DialogProxy$P31', 'com.lbe.doubleagent.client.proxy.DialogProxy$P32', 'com.lbe.doubleagent.client.proxy.DialogProxy$P33', 'com.lbe.doubleagent.client.proxy.DialogProxy$P34', 'com.lbe.doubleagent.client.proxy.DialogProxy$P35', 'com.lbe.doubleagent.client.proxy.DialogProxy$P36', 'com.lbe.doubleagent.client.proxy.DialogProxy$P37', 'com.lbe.doubleagent.client.proxy.DialogProxy$P38', 'com.lbe.doubleagent.client.proxy.DialogProxy$P39', 'com.lbe.doubleagent.client.proxy.DialogProxy$P40', 'com.lbe.doubleagent.client.proxy.DialogProxy$P41', 'com.lbe.doubleagent.client.proxy.DialogProxy$P42', 'com.lbe.doubleagent.client.proxy.DialogProxy$P43', 'com.lbe.doubleagent.client.proxy.DialogProxy$P44', 'com.lbe.doubleagent.client.proxy.DialogProxy$P45', 'com.lbe.doubleagent.client.proxy.DialogProxy$P46', 'com.lbe.doubleagent.client.proxy.DialogProxy$P47', 'com.lbe.doubleagent.client.proxy.DialogProxy$P48', 'com.lbe.doubleagent.client.proxy.DialogProxy$P49', 'com.facebook.FacebookActivity', 'com.facebook.CustomTabMainActivity', 'com.virgo.ads.internal.utils.AdSupporyActivity', 'com.virgo.ads.internal.InsertAdActivity', 'com.mopub.mobileads.RewardedMraidActivity', 'com.mopub.common.privacy.ConsentDialogActivity', 'com.google.android.gms.auth.api.signin.internal.SignInHubActivity', 'com.google.android.gms.common.api.GoogleApiActivity']

Activities

Information computed with AndroGuard.

com.lbe.parallel.ui.tour.SplashActivity
com.lbe.parallel.ui.SkinActivity
com.lbe.parallel.ui.lockscreen.LockScreenActivityImpl
com.lbe.parallel.ui.lockscreen.KeyguardDismissActivity
com.lbe.parallel.ui.tour.NewGuideTourActivity
com.lbe.parallel.ui.cleaner.CleanAssistantActivity
com.lbe.parallel.ui.cleaner.CleanResultActivity
com.lbe.parallel.ui.IncognitoInstallGuideActivity
com.lbe.parallel.ui.CloneInstallGuideActivity
com.lbe.parallel.ui.tour.RatingGuideActivity
com.lbe.parallel.ui.tour.GestureGuideActivity
com.lbe.parallel.ui.HomeActivity
com.lbe.parallel.ui.AboutActivity
com.lbe.parallel.ui.volunteer.VolunteerActivity
com.lbe.parallel.ui.SpecialThanksActivity
com.lbe.parallel.ui.FeedbackActivity
com.lbe.parallel.ui.RaiderActivity
com.lbe.parallel.ui.manager.TaskManagerActivity
com.lbe.parallel.ui.OptimizerWhiteActivity
com.lbe.parallel.ui.manager.StorageManagementActivity
com.lbe.parallel.ui.manager.NotificationManagementActivity
com.lbe.parallel.service.statusbar.viewer.DANotificationPanel
com.lbe.parallel.ui.manager.AppInfoActivity
com.lbe.parallel.ui.ShortcutActivity
com.lbe.parallel.ui.GoogleServicesActivity
com.lbe.parallel.ui.MiddlewareActivity
com.lbe.parallel.ui.ExitMiddlewareActivity
com.lbe.parallel.ui.middleware.MiddlewareAdActivity
com.lbe.parallel.ui.ads.exit.AppExitAdActivity
com.lbe.parallel.ui.install.GooglePlayForwardActivity
com.lbe.parallel.ui.share.ShareActivity
com.lbe.parallel.ui.LaunchDelegateActivity
com.lbe.parallel.ui.SettingsActivity
com.lbe.parallel.ui.SpeedModeSettingsActivity
com.lbe.parallel.ui.GestureSettingsActivity
com.lbe.parallel.ui.keyguard.KeyguardSettingActivity
com.lbe.parallel.ui.keyguard.KeyguardSetLockActivity
com.lbe.parallel.ui.keyguard.KeyguardConfirmActivity
com.lbe.parallel.ui.ShareProxyActivity
com.lbe.parallel.ui.NotificationProxyActivity
com.lbe.parallel.ui.NotificationDummyActivity
com.lbe.parallel.ui.upgrade.UpgradeDialogActivity
com.lbe.parallel.ui.PromptDialogActivity
com.lbe.parallel.ui.ThemeApplyActivity
com.lbe.parallel.ui.BrowserGuideActivity
com.lbe.parallel.ui.browser.BrowserActivity
com.lbe.parallel.ui.SpeedModeTourGuideActivity
com.lbe.parallel.ui.theme.ThemePreviewActivity
com.lbe.parallel.ui.proxy.ProxyConnectionActivity
com.lbe.parallel.ui.proxy.PayDialogActivity
com.lbe.parallel.ui.theme.ThemeActivity
com.lbe.parallel.ui.browser.bookmarks.BookMarksActivity
com.lbe.parallel.ui.browser.bookmarks.HistoryActivity
com.lbe.parallel.ui.browser.share.ShareImageActivity
com.lbe.parallel.ui.browser.BrowserSettingActivity
com.lbe.parallel.ui.CloneAndIncognitoInstallActivity
com.lbe.parallel.test.IntentTestActivity
com.lbe.parallel.ui.operatingcenter.OperatingContentDetailsActivity
com.lbe.parallel.ui.settings.Device64bitSupportActivity
com.lbe.parallel.ui.theme.ps.PsThemeActivity
com.lbe.parallel.ui.theme.ps.PsThemeGuideActivity
com.lbe.parallel.ui.theme.ps.PsThemeApplyActivity
com.lbe.parallel.ui.share.SNSInviteActivity
com.lbe.parallel.ui.lockscreen.NotificationAccessGuideActivity
com.lbe.parallel.ui.lockscreen.AccessNotificationSettingActivity
com.lbe.parallel.ui.SmartLockSettingsActivity
com.lbe.parallel.ui.lockscreen.SmartLockGuideActivity
com.lbe.parallel.ui.billing.BillingActivity
com.google.android.gms.ads.AdActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.lbe.parallel.ui.house.activity.HouseWebActivity
com.lbe.parallel.ui.house.activity.AppFamilyActivity
com.lbe.parallel.ui.lockscreen.SmartLockInstallActivity
com.lbe.parallel.ui.house.activity.GooglePlayForwardActivity
com.android.billingclient.api.ProxyBillingActivity
com.lbe.parallel.widgets.FloatDialogActivity
com.lbe.parallel.widgets.EngineFloatDialogActivity
com.lbe.parallel.ui.house.activity.PSCInvitationActivity
com.lbe.parallel.ui.permission.PermissionActivity
com.lbe.parallel.ui.permission.PermissionGuideActivity
com.lbe.parallel.ui.SecondaryLaunchGuideActivity
com.lbe.parallel.ui.VivoPowerTutorialActivity
com.lbe.doubleagent.service.proxy.ChooserActivity
com.lbe.doubleagent.service.account.ChooseTypeAndAccountActivity
com.lbe.doubleagent.service.account.ChooseAccountTypeActivity
com.lbe.doubleagent.service.account.AddAccountSettings
com.lbe.doubleagent.service.proxy.PendingIntentActivityProxy
com.lbe.doubleagent.service.proxy.ShortcutProxy
com.lbe.doubleagent.service.proxy.NotificationProxyActivity
com.lbe.doubleagent.client.proxy.ActivityProxy$P0
com.lbe.doubleagent.client.proxy.ActivityProxy$P1
com.lbe.doubleagent.client.proxy.ActivityProxy$P2
com.lbe.doubleagent.client.proxy.ActivityProxy$P3
com.lbe.doubleagent.client.proxy.ActivityProxy$P4
com.lbe.doubleagent.client.proxy.ActivityProxy$P5
com.lbe.doubleagent.client.proxy.ActivityProxy$P6
com.lbe.doubleagent.client.proxy.ActivityProxy$P7
com.lbe.doubleagent.client.proxy.ActivityProxy$P8
com.lbe.doubleagent.client.proxy.ActivityProxy$P9
com.lbe.doubleagent.client.proxy.ActivityProxy$P10
com.lbe.doubleagent.client.proxy.ActivityProxy$P11
com.lbe.doubleagent.client.proxy.ActivityProxy$P12
com.lbe.doubleagent.client.proxy.ActivityProxy$P13
com.lbe.doubleagent.client.proxy.ActivityProxy$P14
com.lbe.doubleagent.client.proxy.ActivityProxy$P15
com.lbe.doubleagent.client.proxy.ActivityProxy$P16
com.lbe.doubleagent.client.proxy.ActivityProxy$P17
com.lbe.doubleagent.client.proxy.ActivityProxy$P18
com.lbe.doubleagent.client.proxy.ActivityProxy$P19
com.lbe.doubleagent.client.proxy.ActivityProxy$P20
com.lbe.doubleagent.client.proxy.ActivityProxy$P21
com.lbe.doubleagent.client.proxy.ActivityProxy$P22
com.lbe.doubleagent.client.proxy.ActivityProxy$P23
com.lbe.doubleagent.client.proxy.ActivityProxy$P24
com.lbe.doubleagent.client.proxy.ActivityProxy$P25
com.lbe.doubleagent.client.proxy.ActivityProxy$P26
com.lbe.doubleagent.client.proxy.ActivityProxy$P27
com.lbe.doubleagent.client.proxy.ActivityProxy$P28
com.lbe.doubleagent.client.proxy.ActivityProxy$P29
com.lbe.doubleagent.client.proxy.ActivityProxy$P30
com.lbe.doubleagent.client.proxy.ActivityProxy$P31
com.lbe.doubleagent.client.proxy.ActivityProxy$P32
com.lbe.doubleagent.client.proxy.ActivityProxy$P33
com.lbe.doubleagent.client.proxy.ActivityProxy$P34
com.lbe.doubleagent.client.proxy.ActivityProxy$P35
com.lbe.doubleagent.client.proxy.ActivityProxy$P36
com.lbe.doubleagent.client.proxy.ActivityProxy$P37
com.lbe.doubleagent.client.proxy.ActivityProxy$P38
com.lbe.doubleagent.client.proxy.ActivityProxy$P39
com.lbe.doubleagent.client.proxy.ActivityProxy$P40
com.lbe.doubleagent.client.proxy.ActivityProxy$P41
com.lbe.doubleagent.client.proxy.ActivityProxy$P42
com.lbe.doubleagent.client.proxy.ActivityProxy$P43
com.lbe.doubleagent.client.proxy.ActivityProxy$P44
com.lbe.doubleagent.client.proxy.ActivityProxy$P45
com.lbe.doubleagent.client.proxy.ActivityProxy$P46
com.lbe.doubleagent.client.proxy.ActivityProxy$P47
com.lbe.doubleagent.client.proxy.ActivityProxy$P48
com.lbe.doubleagent.client.proxy.ActivityProxy$P49
com.lbe.doubleagent.client.proxy.DialogProxy$P0
com.lbe.doubleagent.client.proxy.DialogProxy$P1
com.lbe.doubleagent.client.proxy.DialogProxy$P2
com.lbe.doubleagent.client.proxy.DialogProxy$P3
com.lbe.doubleagent.client.proxy.DialogProxy$P4
com.lbe.doubleagent.client.proxy.DialogProxy$P5
com.lbe.doubleagent.client.proxy.DialogProxy$P6
com.lbe.doubleagent.client.proxy.DialogProxy$P7
com.lbe.doubleagent.client.proxy.DialogProxy$P8
com.lbe.doubleagent.client.proxy.DialogProxy$P9
com.lbe.doubleagent.client.proxy.DialogProxy$P10
com.lbe.doubleagent.client.proxy.DialogProxy$P11
com.lbe.doubleagent.client.proxy.DialogProxy$P12
com.lbe.doubleagent.client.proxy.DialogProxy$P13
com.lbe.doubleagent.client.proxy.DialogProxy$P14
com.lbe.doubleagent.client.proxy.DialogProxy$P15
com.lbe.doubleagent.client.proxy.DialogProxy$P16
com.lbe.doubleagent.client.proxy.DialogProxy$P17
com.lbe.doubleagent.client.proxy.DialogProxy$P18
com.lbe.doubleagent.client.proxy.DialogProxy$P19
com.lbe.doubleagent.client.proxy.DialogProxy$P20
com.lbe.doubleagent.client.proxy.DialogProxy$P21
com.lbe.doubleagent.client.proxy.DialogProxy$P22
com.lbe.doubleagent.client.proxy.DialogProxy$P23
com.lbe.doubleagent.client.proxy.DialogProxy$P24
com.lbe.doubleagent.client.proxy.DialogProxy$P25
com.lbe.doubleagent.client.proxy.DialogProxy$P26
com.lbe.doubleagent.client.proxy.DialogProxy$P27
com.lbe.doubleagent.client.proxy.DialogProxy$P28
com.lbe.doubleagent.client.proxy.DialogProxy$P29
com.lbe.doubleagent.client.proxy.DialogProxy$P30
com.lbe.doubleagent.client.proxy.DialogProxy$P31
com.lbe.doubleagent.client.proxy.DialogProxy$P32
com.lbe.doubleagent.client.proxy.DialogProxy$P33
com.lbe.doubleagent.client.proxy.DialogProxy$P34
com.lbe.doubleagent.client.proxy.DialogProxy$P35
com.lbe.doubleagent.client.proxy.DialogProxy$P36
com.lbe.doubleagent.client.proxy.DialogProxy$P37
com.lbe.doubleagent.client.proxy.DialogProxy$P38
com.lbe.doubleagent.client.proxy.DialogProxy$P39
com.lbe.doubleagent.client.proxy.DialogProxy$P40
com.lbe.doubleagent.client.proxy.DialogProxy$P41
com.lbe.doubleagent.client.proxy.DialogProxy$P42
com.lbe.doubleagent.client.proxy.DialogProxy$P43
com.lbe.doubleagent.client.proxy.DialogProxy$P44
com.lbe.doubleagent.client.proxy.DialogProxy$P45
com.lbe.doubleagent.client.proxy.DialogProxy$P46
com.lbe.doubleagent.client.proxy.DialogProxy$P47
com.lbe.doubleagent.client.proxy.DialogProxy$P48
com.lbe.doubleagent.client.proxy.DialogProxy$P49
com.facebook.FacebookActivity
com.facebook.CustomTabMainActivity
com.virgo.ads.internal.utils.AdSupporyActivity
com.virgo.ads.internal.InsertAdActivity
com.mopub.mobileads.RewardedMraidActivity
com.mopub.common.privacy.ConsentDialogActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity

Receivers

Information computed with AndroGuard.

com.appsflyer.MultipleInstallBroadcastReceiver
com.lbe.parallel.receiver.PackageInstallReceiver
com.lbe.parallel.receiver.NotificationOnClickReceiver
com.lbe.parallel.receiver.PsThemeReceiver
com.lbe.parallel.receiver.HouseDownloadReceiver
com.lbe.doubleagent.service.proxy.SystemBroadcastReceiver
com.lbe.doubleagent.service.proxy.PendingIntentReceiverProxy

Services

Information computed with AndroGuard.

com.lbe.parallel.service.LockScreenFloatWindowService
com.lbe.parallel.ui.upgrade.UpgradeIntentService
com.lbe.parallel.service.KeyguardService
com.lbe.parallel.service.GestureService
com.lbe.parallel.service.CrashReportService
com.lbe.parallel.install.AppInstallService
com.lbe.parallel.service.ThemeApplyService
com.lbe.parallel.ui.msgcenter.MessageCenterService
com.lbe.parallel.service.localproxy.LocalProxyService
com.lbe.parallel.ui.lockscreen.NotificationObserverService
com.lbe.doubleagent.service.proxy.PendingIntentServiceProxy
com.lbe.doubleagent.service.proxy.JobProxy
com.lbe.doubleagent.service.proxy.KeepAliveService
com.lbe.doubleagent.service.proxy.ServiceNotificationRemover
com.lbe.doubleagent.service.proxy.AdvertisingIdService
com.lbe.doubleagent.client.proxy.ServiceProxy$P0
com.lbe.doubleagent.client.proxy.ServiceProxy$P1
com.lbe.doubleagent.client.proxy.ServiceProxy$P2
com.lbe.doubleagent.client.proxy.ServiceProxy$P3
com.lbe.doubleagent.client.proxy.ServiceProxy$P4
com.lbe.doubleagent.client.proxy.ServiceProxy$P5
com.lbe.doubleagent.client.proxy.ServiceProxy$P6
com.lbe.doubleagent.client.proxy.ServiceProxy$P7
com.lbe.doubleagent.client.proxy.ServiceProxy$P8
com.lbe.doubleagent.client.proxy.ServiceProxy$P9
com.lbe.doubleagent.client.proxy.ServiceProxy$P10
com.lbe.doubleagent.client.proxy.ServiceProxy$P11
com.lbe.doubleagent.client.proxy.ServiceProxy$P12
com.lbe.doubleagent.client.proxy.ServiceProxy$P13
com.lbe.doubleagent.client.proxy.ServiceProxy$P14
com.lbe.doubleagent.client.proxy.ServiceProxy$P15
com.lbe.doubleagent.client.proxy.ServiceProxy$P16
com.lbe.doubleagent.client.proxy.ServiceProxy$P17
com.lbe.doubleagent.client.proxy.ServiceProxy$P18
com.lbe.doubleagent.client.proxy.ServiceProxy$P19
com.lbe.doubleagent.client.proxy.ServiceProxy$P20
com.lbe.doubleagent.client.proxy.ServiceProxy$P21
com.lbe.doubleagent.client.proxy.ServiceProxy$P22
com.lbe.doubleagent.client.proxy.ServiceProxy$P23
com.lbe.doubleagent.client.proxy.ServiceProxy$P24
com.lbe.doubleagent.client.proxy.ServiceProxy$P25
com.lbe.doubleagent.client.proxy.ServiceProxy$P26
com.lbe.doubleagent.client.proxy.ServiceProxy$P27
com.lbe.doubleagent.client.proxy.ServiceProxy$P28
com.lbe.doubleagent.client.proxy.ServiceProxy$P29
com.lbe.doubleagent.client.proxy.ServiceProxy$P30
com.lbe.doubleagent.client.proxy.ServiceProxy$P31
com.lbe.doubleagent.client.proxy.ServiceProxy$P32
com.lbe.doubleagent.client.proxy.ServiceProxy$P33
com.lbe.doubleagent.client.proxy.ServiceProxy$P34
com.lbe.doubleagent.client.proxy.ServiceProxy$P35
com.lbe.doubleagent.client.proxy.ServiceProxy$P36
com.lbe.doubleagent.client.proxy.ServiceProxy$P37
com.lbe.doubleagent.client.proxy.ServiceProxy$P38
com.lbe.doubleagent.client.proxy.ServiceProxy$P39
com.lbe.doubleagent.client.proxy.ServiceProxy$P40
com.lbe.doubleagent.client.proxy.ServiceProxy$P41
com.lbe.doubleagent.client.proxy.ServiceProxy$P42
com.lbe.doubleagent.client.proxy.ServiceProxy$P43
com.lbe.doubleagent.client.proxy.ServiceProxy$P44
com.lbe.doubleagent.client.proxy.ServiceProxy$P45
com.lbe.doubleagent.client.proxy.ServiceProxy$P46
com.lbe.doubleagent.client.proxy.ServiceProxy$P47
com.lbe.doubleagent.client.proxy.ServiceProxy$P48
com.lbe.doubleagent.client.proxy.ServiceProxy$P49
cn.thinkingdata.android.TDQuitSafelyService$TDKeepAliveService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.android.gms.ads.AdService

Sample timeline

Certificate valid not before Feb. 20, 2017, 1:46 p.m.
Oldest file found in APK Oct. 22, 2020, 2:45 p.m.
Latest file found in APK Oct. 22, 2020, 2:45 p.m.
First submission on VT Oct. 23, 2020, 5:29 a.m.
Last submission on VT June 11, 2021, 1:17 p.m.
Upload on Pithus Aug. 17, 2021, 5:41 p.m.
Certificate valid not after Feb. 14, 2042, 1:46 p.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application implement asymmetric key generation.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['NFC', 'network connectivity', 'camera', 'location', 'bluetooth', 'microphone'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to ['calender', 'system logs', 'address book'].
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_CKM.1.1(1) The application generate asymmetric cryptographic keys not in accordance with FCS_CKM.1.1(1) using key generation algorithm RSA schemes and cryptographic key sizes of 1024-bit or lower.
Cryptographic Asymmetric Key Generation
FCS_COP.1.1(1) The application perform encryption/decryption in accordance with a specified cryptographic algorithm AES-CBC (as defined in NIST SP 800-38A) mode or AES-GCM (as defined in NIST SP 800-38D) and cryptographic key sizes 256-bit/128-bit.
Cryptographic Operation - Encryption/Decryption
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_COP.1.1(3) The application perform cryptographic signature services (generation and verification) in accordance with a specified cryptographic algorithm RSA schemes using cryptographic key sizes of 2048-bit or greater.
Cryptographic Operation - Signing
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FIA_X509_EXT.2.2 When the application cannot establish a connection to determine the validity of a certificate, the application allow the administrator to choose whether to accept the certificate in these cases or accept the certificate ,or not accept the certificate.
X.509 Certificate Authentication
FPT_TUD_EXT.2.1 The application shall be distributed using the format of the platform-supported package manager.
Integrity for Installation and Update

Code analysis

Information computed with MobSF.

High
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 com/lbe/doubleagent/ch.java
com/lbe/doubleagent/service/m.java
com/lbe/parallel/ui/install/b.java
com/alibaba/fastjson/JSONArray.java
com/lbe/doubleagent/bs.java
com/lbe/doubleagent/service/arm64/DAARM64Helper.java
com/lbe/parallel/ui/operatingcenter/b.java
com/lbe/parallel/we.java
com/lbe/doubleagent/service/packageinstaller/b.java
com/lbe/parallel/policy/e.java
com/lbe/parallel/utility/k0.java
com/lbe/doubleagent/client/g.java
Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/lbe/doubleagent/service/DAActivityManager.java
com/lbe/parallel/s1.java
cn/thinkingdata/android/PathFinder.java
com/lbe/doubleagent/service/account/c.java
cn/thinkingdata/android/utils/TDLog.java
com/lbe/parallel/utility/x.java
com/lbe/doubleagent/df.java
com/lbe/doubleagent/service/account/b.java
com/lbe/doubleagent/config/LBELog.java
com/lbe/parallel/widgets/drawable/b.java
cn/thinkingdata/android/ThinkingDataRuntimeBridge.java
com/lbe/parallel/k3.java
com/mopub/volley/toolbox/HttpHeaderParser.java
com/lbe/parallel/a.java
com/lbe/doubleagent/client/g.java
com/virgo/ads/internal/utils/o.java
cn/thinkingdata/android/TDQuitSafelyService.java
com/lbe/doubleagent/service/account/AddAccountSettings.java
com/lbe/doubleagent/service/m.java
com/mopub/network/MultiAdResponse.java
cn/thinkingdata/android/utils/HttpService.java
com/lbe/doubleagent/cf.java
com/lbe/doubleagent/service/g.java
com/mopub/volley/toolbox/DiskBasedCache.java
com/mopub/volley/toolbox/BasicNetwork.java
com/lbe/doubleagent/service/proxy/ResolverActivity.java
com/lbe/doubleagent/q.java
com/virgo/tracker/bi/api/b.java
org/microg/safeparcel/SafeParcelReader.java
com/lbe/doubleagent/client/e.java
com/lbe/doubleagent/service/DAParceledListSlice.java
com/lbe/doubleagent/service/packageinstaller/d.java
com/lbe/parallel/DAApp.java
com/mopub/volley/CacheDispatcher.java
com/lbe/doubleagent/service/DAJobManager.java
com/lbe/doubleagent/service/account/ChooseTypeAndAccountActivity.java
com/lbe/parallel/i3.java
com/mopub/common/privacy/MoPubIdentifier.java
com/lbe/parallel/t8.java
cn/thinkingdata/android/utils/PropertyUtils.java
cn/thinkingdata/android/ThinkingDataActivityLifecycleCallbacks.java
com/lbe/parallel/u0.java
com/mopub/volley/toolbox/ImageRequest.java
com/lbe/doubleagent/am.java
com/mopub/nativeads/GooglePlayServicesAdRenderer.java
com/lbe/parallel/utility/d.java
com/mopub/volley/toolbox/JsonRequest.java
cn/thinkingdata/android/TDContextConfig.java
com/lbe/doubleagent/service/proxy/JobProxy.java
com/mopub/common/MoPub.java
cn/thinkingdata/android/ThinkingAnalyticsSDK.java
cn/thinkingdata/android/DatabaseAdapter.java
cn/thinkingdata/android/TDConfig.java
com/mopub/volley/NetworkDispatcher.java
cn/thinkingdata/android/DataHandle.java
com/mopub/volley/VolleyLog.java
cn/thinkingdata/android/SystemInformation.java
com/lbe/parallel/a4.java
cn/thinkingdata/android/TDWebAppInterface.java
com/lbe/doubleagent/service/proxy/ChooserActivity.java
com/lbe/parallel/t.java
com/lbe/doubleagent/service/ag.java
org/virgo/volley/k.java
com/mopub/common/SdkConfiguration.java
com/appsflyer/AFLogger.java
com/lbe/parallel/widgets/drawable/RoundedImageView.java
com/mopub/mraid/MraidController.java
com/lbe/parallel/s8.java
com/lbe/doubleagent/utility/a.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/lbe/parallel/ui/manager/r.java
com/lbe/doubleagent/service/m.java
com/lbe/doubleagent/client/IOUtils.java
com/lbe/parallel/psbrowser/ui/widget/d.java
com/lbe/doubleagent/service/i.java
com/lbe/parallel/z6.java
com/lbe/parallel/qb.java
com/lbe/parallel/h8.java
com/lbe/doubleagent/client/s.java
com/lbe/doubleagent/client/n.java
com/lbe/doubleagent/service/proxy/ResolverActivity.java
com/lbe/doubleagent/q.java
com/mopub/mraid/MraidNativeCommandHandler.java
com/lbe/doubleagent/bw.java
com/lbe/parallel/utility/d.java
com/lbe/doubleagent/utility/c.java
com/lbe/parallel/ui/share/ShareActivity.java
com/lbe/parallel/a.java
com/virgo/ads/internal/utils/o.java
Medium
CVSS:4.3
IP Address disclosure
MASVS: MSTG-CODE-2
CWE-200 Information Exposure
Files:
 com/lbe/parallel/service/localproxy/LocalProxyService.java
com/lbe/parallel/ui/browser/j.java
com/lbe/doubleagent/service/DAActivityManager.java
com/lbe/parallel/utility/p.java
com/lbe/parallel/ui/clone/e.java
com/appsflyer/g0.java
com/lbe/doubleagent/client/g.java
High
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 com/lbe/parallel/ui/operatingcenter/OperatingContentProvider.java
com/virgo/ads/internal/multiprocesspreferences/SpProviderUtil.java
cn/thinkingdata/android/DatabaseAdapter.java
com/lbe/parallel/multiprocesspreferences/provider/SpProviderUtil.java
com/virgo/tracker/bi/api/DatabaseHelper.java
com/lbe/parallel/ui/browser/bookmarks/BrowserDataProvider.java
com/lbe/parallel/lg.java
com/lbe/parallel/ui/theme/ps/b.java
com/lbe/parallel/install/AppInstallProvider.java
High
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/virgo/ads/internal/utils/e.java
com/appsflyer/d0.java
com/lbe/parallel/u8.java
com/lbe/parallel/service/localproxy/b.java
com/virgo/ads/internal/utils/d.java
com/lbe/parallel/utility/z.java
High
CVSS:7.4
Insecure Implementation of SSL. Trusting all the certificates or accepting self signed certificates is a critical Security Hole. This application is vulnerable to MITM attacks
MASVS: MSTG-NETWORK-3
CWE-295 Improper Certificate Validation
M3: Insecure Communication
Files:
 com/lbe/parallel/m8.java
com/mopub/network/CustomSSLSocketFactory.java
High
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/mopub/common/util/Utils.java
com/lbe/doubleagent/ed.java
com/lbe/parallel/widgets/PatternUtils.java
com/appsflyer/d0.java
com/lbe/parallel/utility/d.java
com/lbe/doubleagent/df.java
com/lbe/parallel/w8.java
com/lbe/parallel/billing/BillingHelper.java
High
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/lbe/doubleagent/service/i.java
com/lbe/doubleagent/service/arm64/DAARM64Helper.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 com/lbe/parallel/utility/f.java
com/lbe/parallel/jf.java
High
CVSS:7.4
Files may contain hardcoded sensitive informations like usernames, passwords, keys etc.
MASVS: MSTG-STORAGE-14
CWE-312 Cleartext Storage of Sensitive Information
M9: Reverse Engineering
Files:
 com/mopub/common/GpsHelper.java
com/alibaba/fastjson/JSON.java
com/lbe/parallel/utility/SPConstant.java
com/mopub/common/Constants.java
com/mopub/common/MoPubBrowser.java
com/mopub/mobileads/GooglePlayServicesBanner.java
com/mopub/mobileads/BaseVideoPlayerActivity.java
com/mopub/common/DataKeys.java
com/mopub/mobileads/GooglePlayServicesInterstitial.java
Medium
CVSS:8.8
Insecure WebView Implementation. Execution of user controlled code in WebView is a critical Security Hole.
MASVS: MSTG-PLATFORM-7
CWE-749 Exposed Dangerous Method or Function
M1: Improper Platform Usage
Files:
 cn/thinkingdata/android/ThinkingAnalyticsSDK.java
com/lbe/parallel/psbrowser/core/PsWebView.java
com/lbe/parallel/ui/house/holders/H5ViewHolder.java
com/lbe/parallel/base/e.java
High
CVSS:7.4
Insecure WebView Implementation. WebView ignores SSL Certificate errors and accept any SSL Certificate. This application is vulnerable to MITM attacks
MASVS: MSTG-NETWORK-3
CWE-295 Improper Certificate Validation
M3: Insecure Communication
Files:
 com/lbe/parallel/psbrowser/core/PsWebView.java
Pygal Switzerland: 200 Germany: 100 Ireland: 100 Netherlands: 100