Mandatory Security Implementation Prerequisites and Recommendations
Overview
This document outlines the mandatory prerequisites and recommended security practices that must be followed before and during the integration of Bugsmirror security solutions such as Defender, Shield, and ThreatLock.
It is designed to ensure that your application operates within a secure, stable, and controlled environment, minimizing risks that cannot be addressed by runtime protection alone. Effective application security requires a layered approach that includes secure development, proper configuration, and controlled deployment practices.
The guidelines in this document cover critical areas such as:
- Managing and deprecating insecure or legacy application versions.
- Addressing known vulnerabilities before production.
- Performing thorough QA and validation.
- Securing APIs and backend communication.
- Ensuring compatibility with secure platforms and environments.
- Enabling recommended security controls and configurations.
Why This Is Important
Failure to follow these prerequisites may result in:
- Increased exposure to reverse engineering, API abuse, and runtime attacks.
- Exploitation of known but unpatched vulnerabilities.
- Security gaps due to legacy builds or insecure platforms.
- Improper integration leading to application instability or bypass scenarios.
These recommendations help establish a strong security baseline, ensuring that Bugsmirror solutions can function effectively and deliver maximum protection against modern attack techniques.
Mandatory Security Implementation Prerequisites and Recommendations are following:
Deprecate Older Application Builds Without Bugsmirror Defender Protection
We recommend deprecating older application builds that do not include RASP protection and discontinuing backend compatibility for such versions, in order to maintain a consistent security posture across users.
Importance:
Older builds without Runtime Application Self-Protection (RASP) remain vulnerable to reverse engineering, tampering, and runtime attacks. Older versions of many applications are available in several websites like softtonic, APKmirror, etc. These versions can be downloaded and manipulated by attackers.
Discontinuing backend support for such versions ensures that all active users operate within a consistent and secure environment, reducing the overall attack surface. It includes:
- Enforce minimum app version. API requests should include updated app versions. Backend check- force update message and block all critical APIs.
- In cases where there is a possibility of prior misuse or API interception, it is advisable to rotate critical API endpoints and gradually retire legacy API support to reduce exposure.
- If APIs have been previously exposed or intercepted, attackers may use them for unauthorized access. Rotating API endpoints, renaming exposed APIs, and retiring legacy API support helps prevent replay attacks, unauthorized consumption, and long-term exploitation of compromised endpoints.
Address Known Vulnerabilities Before Production and Impose Security Validation
While Bugsmirror RASP provides strong runtime protection, we also recommend addressing any known or open vulnerabilities identified through testing as part of overall security hygiene.
We suggest a thorough red teaming assessment prior integration with our red teaming tool ThreatLock. Red teaming simulates real-world attack scenarios to identify hidden vulnerabilities that automated tools may miss. This proactive approach helps uncover advanced threats and strengthens the application’s resilience before attackers can exploit weaknesses.
Importance:
Fixing internal vulnerabilities identified through testing ensures a strong foundational security posture and minimizes the risk of exploitation beyond runtime defenses. Industry data consistently shows that most breaches exploit known, unpatched vulnerabilities rather than zero-day attacks. For example, incidents like the 2017 Equifax Data Breach occurred due to a publicly known vulnerability that remained unpatched, leading to massive data exposure. Fixing vulnerabilities at the code and architecture level ensures a strong security foundation and Bugsmirror Defender will be a security cover that prevents any access for attacks.
Perform Comprehensive QA
Prior to releasing the build to production, we suggest completing thorough QA.
Importance:
Thorough QA and security testing before production release ensures application stability and verifies that all security controls function as expected. Since Defender operates at runtime and interacts with application execution, improper validation can lead to crashes, unexpected behavior, or disruption in existing functionalities. For example, conflicts may arise when protected methods are invoked alongside application logic, user flows, or background processes.
Comprehensive QA ensures that the integration does not interfere with normal application behavior, and that all features continue to function reliably. This minimizes the risk of failures, ensures seamless user experience, and prevents production rollbacks after security integration.
Disable Support for Legacy and Insecure Platforms
Disable support for legacy and insecure platforms by restricting application compatibility to Android versions 9 and below.
Importance:
Older platforms (e.g., Android versions 9 and below) lack modern security features and are more susceptible to exploitation. Platforms Android 9 and below lack protections like stronger sandboxing, improved encryption standards, and enhanced runtime security mechanisms. For example, many large-scale exploits such as the Stagefright Vulnerability affected older Android versions and remained exploitable on devices that no longer received security updates.
Additionally, while our solution supports all versions of Android and iOS, older platforms may face limitations such as lower memory capacity, lack of security updates, and potential compatibility issues with modern security features. Restricting support reduces exposure to platform-level vulnerabilities and ensures stronger baseline security.
Use Latest Version of MASST CLI
Using the latest version of MASST CLI, as it is constantly updated to improve compatibility, stability, and integration efficiency with evolving application environments. Do not keep MAST CLI downloaded, always use the curl command.
Importance:
Regular updates ensure support for newer OS versions, frameworks, and build structures, while also incorporating enhancements to protection mechanisms and bug fixes. Relying on the latest version helps prevent integration issues, ensures optimal functioning of the RASP solution.
Enable Recommended Controls
Enabling all recommended security controls ensures comprehensive coverage against known attack vectors and necessary security compliances and industry standards. It ensures updated security features, bug fixes, and improved protection mechanisms.
Always Integrate Bugsmirror Shield
Bugsmirror Shield is an advanced security solution that protects from IP theft and reverse engineering. We recommend always integrating it with the Bugsmirror defender.
Importance:
Bugsmirror Shield provides protection beyond traditional obfuscation, it transforms codes as per the techstack/framework, which only decrypt during runtime. Its integration is zero-code and seamless and compatible with Android/iOS. It will protect against app repackaging and app tampering. Even in case of app repackaging, the codes will be obscure to the attackers.
Follow this for selecting frameworks and packages for code encryption: Bugsmirror MASST Integration Document.
Implement Trust API Binding
Implement Zero Trust Runtime API Binding to ensure every API request is cryptographically verified at runtime using RASP-generated, short-lived tokens. This binds each request to a secure and untampered app environment, preventing misuse from compromised or unauthorized devices. It significantly strengthens API security by enforcing per-request validation instead of relying solely on session-based trust.
Importance:
Binding ensures that the protected app can only communicate with legitimate backend services and approved environments. Without proper binding, attackers may bypass protections or misuse APIs, weakening the overall security model.