Apply Android app security guidance around secrets, storage, network trust, exported components, and least privilege.
57
48%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/android-security-best-practices/SKILL.mdreferences/patterns.md when you need the attack-surface checklist or the storage/network/component decision matrix.references/scenarios.md for manifest, backup, WebView, and release-hardening review paths.android-modernization-upgradeandroid-ci-cd-release-playstoreandroid:exported, component permissions, FileProvider, networkSecurityConfig, debug-only trust anchors, and immutable PendingIntents.android:exported or intent filters ambiguous on launchable or IPC components.FileProvider and system surfaces.FileProvider usage.rg -n "android:exported|android:permission|FileProvider|grantUriPermissions" examplesrg -n "networkSecurityConfig|usesCleartextTraffic|allowBackup|fullBackupContent|dataExtractionRules" examplespython3 scripts/eval_triggers.py --skill android-security-best-practicesc5bf673
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.