Android Security Check / $997 USD

Find out what attackers see
when they look at your app.

Your Android app sits on the Play Store where anyone, including attackers, can download it. With free tools, they can open it up and read the inner workings in minutes. I do the same thing, find the security issues that put your business and your customers at risk, and give you a clear report on what to fix.

Email [email protected] with your app's Play Store link

security-check-report.pdf
Executive Summary
Your application has 3 critical, 2 high, and 1 medium...
Finding 1: Hardcoded API Key in BuildConfig
Severity: Critical
CWE: CWE-798
The application embeds a production API key in...
Evidence
app/src/main/java/.../BuildConfig.java:12
public static final String API_KEY =...
Verified Impact
Code path traces to UserService.fetchAll()
Key grants read access to the user table...
Remediation
1. Rotate the exposed key immediately
2. Move API authentication server-side...

Who This Is For

+

You ship an Android app to the Play Store

+

You do not have an in-house mobile security team

+

You handle user accounts, payments, or sensitive data

+

You want to know what is exposed in your app before someone else finds it

Why This Matters

01

Your app is not a black box

The app file your customers download from the Play Store is the same file an attacker downloads. With free tools available to anyone, they can open it up and read what is inside in under 5 minutes. Passwords, keys, and shortcuts your developers left behind are all visible.

02

Automated scans miss the real risks

The cheap automated security tools your team may have run only catch the obvious problems. They miss the issues that actually let attackers steal customer accounts, drain wallets, or impersonate your support team. Those need a human who knows what to look for.

03

Most security tests skip your app

If you have had a security test done before, it was probably a website test, not a mobile app test. Your mobile app is a separate piece of software with its own set of risks, and it usually gets overlooked.

What Gets Checked

What I look at

  • Hidden passwords and keys that should not be inside the app where anyone can find them
  • Open doors that let other apps on the user's phone interact with yours in ways you did not intend
  • Special links that open your app from a website or an email and could be used to trick your users
  • In-app browser windows that could load attacker-controlled content or leak data
  • Login and session handling, looking for shortcuts that bypass authentication
  • Data stored on the user's phone, looking for sensitive information left unprotected
  • Network connections the app makes, looking for weak protections that allow eavesdropping
  • Third-party services bundled into the app and the access they have

How I confirm the risk is real

  • For every issue I find, I read the relevant code to confirm an attacker can actually reach it
  • I trace what data, accounts, or functions would be exposed if exploited
  • I document any prerequisites the attacker would need (a victim clicking a link, having the app installed, etc.)
  • Severity is rated on confirmed real-world impact, not theoretical risk
  • Every finding in your report is backed by direct evidence from your code

All work is done by reading your app's code. I do not connect to your servers, create accounts, or run anything against your live systems.

What this tier does not cover

Live testing of your servers and APIs, end-to-end attack demonstrations against your production app, your iOS app, your website, infrastructure testing, retesting after fixes, and compliance certifications. All of these are available as deeper engagements after the security check.

How It Works

1

Send your app details

A link to your app on the Play Store is all I need. Sign a short agreement, pay 50% upfront. No meetings, no setup, no access to your systems required.

2

I do the work

3 business days of focused review by me personally. You only hear from me if I have a question. No subcontractors, no juniors, no offshore team.

3

You get a clear report

A PDF report covering what I found, why it matters in plain language, and exactly what your team needs to do to fix it. Pay the remaining 50%.

4

Optional walkthrough

If you want, a 30-minute call to walk through the report. Most clients just forward it to their dev team and start fixing.

What You Get

security-check-report.pdf
Executive Summary
Your application has 3 critical, 2 high, and 1 medium...
Finding 1: Hardcoded API Key in BuildConfig
Severity: Critical
CWE: CWE-798
The application embeds a production API key in...
Evidence
app/src/main/java/.../BuildConfig.java:12
public static final String API_KEY =...
Verified Impact
Code path traces to UserService.fetchAll()
Key grants read access to the user table...
Remediation
1. Rotate the exposed key immediately
2. Move API authentication server-side...

A report your whole team can use

  • Executive summary written in plain English so you and your leadership understand the situation without a technical translator
  • Findings list ranked by severity: Critical, High, Medium, Low, so you know what is urgent
  • Technical write-up for each finding that your developers can act on directly, with evidence from your code
  • Step-by-step fixes your team can implement without guesswork
  • Priority roadmap telling you what to fix first and why

Track Record

93
Vulnerability reports submitted
32
Critical severity findings
30
High severity findings
55+
Applications tested

Pricing

Android Security Check
$997 USD
50% upfront, 50% on delivery

What you get

  • One Android app reviewed in full
  • Hidden passwords and keys uncovered
  • Open doors and weak points in the app identified
  • Special links and in-app browsers checked for risk
  • Login and session handling reviewed
  • Sensitive data on the user's phone checked
  • Risk of every issue confirmed by reading the code
  • Full PDF report with plain English summary and technical details
  • Step-by-step fixes your team can act on
  • 3 business day turnaround
  • Optional 30-minute walkthrough call

Not in this tier

  • Live testing of your app in action
  • Testing of your servers or APIs
  • Demonstrating attacks against your live app
  • Your iOS app
  • Your website
  • Verifying fixes after your team makes them
  • Compliance certifications

Each is available as a deeper engagement after the security check.

Get started

Email [email protected] with your app's Play Store link. Agreement back within 24 hours.

After the Security Check

The security check is the starting point. Most clients use it to find what is exposed in their app, then go deeper only if they need to.

Step 1
You are here

Android Security Check

I read your app's code and confirm what attackers could do with it.

$997 USD
Step 2

Full Mobile Audit

I run the app live, attack the issues end to end, test your servers and APIs, and cover your iOS app too. Includes a retest after your team fixes things.

From $3,500 USD
Step 3

Quarterly Security Review

Ongoing coverage as your app changes. Checks on new releases and a direct line to me for security questions.

From $2,500 USD / quarter

You can stop at Step 1. The deeper steps are only for clients who want to go further.

Questions

I'm not technical. Will I understand the report?

Yes. The report has two parts. The first is a plain English summary that explains what was found and what it means for your business. The second is the technical detail your developers need to actually fix it. You read the first part, your team works on the second.

Why $997 and not $5,000 or $10,000?

This is a focused review, not a full audit. I read the inner workings of your app and confirm the risks through the code. I do not run live attacks against your servers or demonstrate end-to-end exploits, which is what costs more time and money. You get the most important information for the lowest cost. Deeper engagements come after, only if you want to go further.

Will you contact our servers or break anything?

No. All work is done by reading the code in your app. I do not send any requests to your servers, do not create any accounts, and do not run anything against your live systems. There is zero risk to your production environment.

Do you need our source code or developer access?

No. I work from the same app file your customers download from the Play Store. All you need to give me is a link to your app. No source code, no developer access, no internal logins.

How do you keep our information confidential?

Before any work begins, we sign a short agreement that covers confidentiality and how I handle and dispose of any data related to your app. Your identity and the findings are never shared without your written permission.

What happens after the report?

Your dev team fixes the issues using the steps in the report. If you want me to go further, deeper testing of your live app, your servers, your iOS app, or verifying the fixes are correct, that is available as a separate engagement.

Do I need to sign a contract?

Yes. A short, plain-English agreement that defines exactly what I will and will not do, the timeline, payment terms, and confidentiality. It protects both of us.

Where are you based?

Australia. I work with clients worldwide. All communication is by email. No meetings required to get started, just your app details and a signed agreement.

Ready to find out what is hidden in your app?

Send me a link to your app on the Play Store. I will send back an agreement within 24 hours and a full report within 4 business days.