REJECTIONDefiniteGuideline Security
AndroidSafety
Suspicious Execution Patterns
Detected use of Runtime.exec or ProcessBuilder which can be used to execute arbitrary shell commands.
Quick Fix
Avoid executing shell commands at runtime. Use Android APIs for system-level actions.
What Gets Detected
Detection Type:CODE PATTERN
Patterns detected:
Runtime.getRuntime().execProcessBuilder