Skip to main content

Artifacts

Introduction

An artifact is a specific file detected during our MATRIX scan. These files are typically found in the application's binary, and can be used to identify potential security vulnerabilities.

We surface these in the report with either the contents or the filepath to help you identify potential locations for hardcoded API keys, credentials or sensitive application values.

Types of Artifacts

iOS

TypeDescription
Application Code SigningThe application's code signing information.
Plist FilesThe application's property list files, which contain configuration data.
Application DatabasesA list of all databases the application has within local storage and the path to the files for the user.
Application CertificatesThe application's certificates. These can be used for certificate pinning implementations, code signing, and cryptographic purposes and can be used to assist in various manual testing efforts.
Keychain DumpThe application's keychain dump. This can be used to identify sensitive information stored in the keychain.
Background ModesThe application's background modes. In iOS, background modes allow apps to continue performing tasks or providing services even when they are not in the foreground. This is essential for ensuring a seamless user experience, as some tasks need to run in the background to deliver timely updates or maintain functionality. Apple provides several background modes that developers can use based on the app’s requirements. From a security perspective, background modes in iOS can potentially be exploited by malicious apps. These concerns include user tracking, data exfiltration, eavesdropping, and resource abuse.
GeolocationThe geolocation of all the domains connected to by the application.

Android

TypeDescription
Application Contains Hardcoded URLsThis artifact statically checks for hardcoded URLs within the application codebase and resources.
Application Utilizes Intents Vulnerable to RedirectionThe application has intents marked as exported. A manual review is needed to assess for a potential vulnerability.
GeolocationThe geolocation of all the domains connected to by the application.