Runtime Security Check-wise Recommendations
Overview
This document outlines check-wise runtime security recommendations when integrating Bugsmirror Defender, clearly distinguishing between recommended and optional controls. It is designed to help organizations implement an optimal security configuration based on threats, risk exposure, and UX friction score. Mandatory controls ensure a strong baseline protection against common and advanced threats, while optional features provide additional layers of defence for enhanced security. By following these recommendations, teams can achieve a balanced approach between robust protection, application stability, and operational efficiency.
Security Recommendations Table
| Sr. No. | Security Area | Security Checks | Risk Score on Disable (1-10) | UX Friction Score (1-10) | Final Conclusion |
|---|---|---|---|---|---|
| 1 | Device Integrity | Kernel Level Root Strong Device integrity Custom ROM | 7 | Med (4) | Recommended |
| 2 | OS Integrity | OEM Unlock | 5 | Med (5) | Optional |
| 3 | ADB Wireless Debugging ADB USB Debugging | 3 | High (7) | Recommended | |
| 4 | Developer Mode Enable Check | 2 | High (8) | Recommended | |
| 5 | Accessibility Permission Detection | 6 | Very High (9) | Optional | |
| 6 | Device Lock Enablement | 6 | Low (2) | Optional | |
| 7 | Location Spoofing | 6 | Very High (9) | Optional | |
| 8 | Secure Communication | Unsecured Wifi Detection | 5 | High (8) | Optional |
| 9 | Proxy Detection Packet Sniffing Detection SSL Pinning API Tampering MitM attack prevention | 6 | Low (2) | Recommended | |
| 10 | VPN Detection | 4 | High (8) | Recommended | |
| 11 | Mobile Privacy | Screen Shot Prevention | 5 | Med (5) | Optional |
| 12 | Screen Recording Prevention | 5 | Med (5) | Optional | |
| 13 | Screen Share via ADB Prevention | 5 | Med (4) | Optional | |
| 14 | Screen Share by Cast Prevention | 5 | Med (4) | Optional | |
| 15 | Screen Overlay Prevention | 8 | Low (1) | Recommended | |
| 16 | Permanent Unsecure Device Blocking | 5 | Med (4) | Recommended | |
| 17 | Mobile Fraud | App Cloning/Second Space Prevention | 6 | Low (2) | Recommended |
| 18 | Keylogger Prevention | 7 | Low (1) | Recommended | |
| 19 | Social Engineering | *Marketplace Enforcement Check Apk Sharing | 6 | Med (4) | Recommended |
Disclaimer
We recommend enabling all available security checks to ensure comprehensive protection of your application. However, based on specific application requirements, certain features may be disabled at your discretion.
Please note that disabling any security feature may introduce potential risks and reduce overall protection. Such decisions are solely the responsibility of the user. Bugsmirror shall not be held liable for any vulnerabilities, breaches, or damages resulting from the disabling of recommended features.
This document provides guidance and recommendations only and does not mandate implementation.