Appraysal
Back to Rules
REJECTIONDefiniteGuideline SecurityGoogle PlayAndroidSafety

Suspicious Execution Patterns

Detected use of Runtime.exec or ProcessBuilder which can be used to execute arbitrary shell commands.

Quick Fix

Avoid executing shell commands at runtime. Use Android APIs for system-level actions.

What Gets Detected

Detection Type:CODE PATTERN
Patterns detected:
Runtime.getRuntime().execProcessBuilder

Check Your App

Scan your project to see if this rule affects your app

Run Free Scan