Tapjacking Detection (BETA)
Android 15 hardens OS; apps must still block obscured touches.
AES Timeout
New
-aes-timeoutflag (default 5 minutes) prevents stalls during key analysis.
JSON Reporting
Use
-json <file>for structured, machine-readable output. CSV has been removed.
This tool is designed to identify Android apps that could be vulnerable to the Permission-Slip attack (a Confused Deputy scenario leading to elevated permissions).
- Exported component triage (CALL, VIEW+
javascript:, weak custom permissions) - Tapjacking/TapTrap detection (Compose & XML; missing obscured-touch filtering)
- ADB POC commands for quick validation
- HTML + JSON reports with Tapjacking Portfolio
- Severity & Confidence (0–100) scoring
-allsafemode skips AES for fast sweeps
git clone https://github.com/actuator/pSlip.git
cd pSlip
sudo apt install apktool jadx# Directory sweep
python pSlip.py . -all -html demo.html -json demo.json
# Fast sweep (skip AES/jadx)
python pSlip.py path/to/apks -allsafe -html report.htmFlags:
-p, -perm, -js, -call, -aes, -taptrap, -json <file>, -all, -allsafe, -aes-timeout <minutes>
login | auth | verify | pay | checkout | approve | password | otp | pin | confirm | secure | submit | card | transfer | send
- HTML: Tapjacking Portfolio (one line per app) + detailed findings
- JSON: Full vulnerability details (machine-readable)
- Added Tapjacking/TapTrap detector (Compose + XML)
- New
-aes-timeoutflag (default 5 minutes) - Added JSON reporting (
-json <file>); removed CSV - Improved scoring and output clarity
Pull requests are welcome. For major changes, please open an issue first to discuss your proposal.