Documentation

Go to Portal Website

Hook Detection

PlanPlatformsMASVS
TeamAndroidMASVS-RESILIENCE-4

Overview

Hook Detection identifies signs that an Android app is running in an instrumented or manipulated runtime environment. It is designed for apps that need to detect dynamic analysis, runtime tampering, credential interception, automated abuse, or attempts to disable security checks while the app is running.

When a signal is detected, AppTego applies your configured response. Teams commonly begin with logging, then move sensitive journeys such as login, payments, account changes, wallet activity, or regulated data access to a stricter response after reviewing telemetry.

When To Use It

Use this control when your threat model includes:

How It Works

The control evaluates several categories of runtime indicators and combines them into a detection decision. The public behavior is intentionally simple: the app checks for signs of instrumentation during startup or SDK initialization, then fires the configured response if the environment looks unsafe.

AppTego does not expose the exact signatures, thresholds, or inspection sequence in public documentation. Those details change as attacker tooling changes and are treated as part of the protection logic.

How to Enable the Control

Navigate to Detection & Response from the AppTego portal, and expand the Runtime Attack Detection section. Under this section you will find the Hook Detection control. Click Enable Configuration, choose the response action, and save the configuration for the next build or for it to be applied with a live push (if enabled).

API Configuration Example

{
  "HookDetectionResponse": {
    "detection": true,
    "action": "alert",
    "title": "Security Warning",
    "message": "This device environment appears unsafe. Please close any debugging or modification tools and try again.",
    "buttons": ["OK"],
    "actions": ["close"],
    "redirects": [""]
  }
}
FieldPurpose
detectionEnables or disables runtime hook detection.
actionSelects the response style, such as alert, close, log, or warn.
title / messageUser-facing text shown when a response is displayed.
buttons / actions / redirectsDefines the available response buttons and their outcomes.

Response Strategy

Rollout stageRecommended response
EvaluationLog detections and compare them with fraud, support, and device data.
Limited rolloutWarn users or restrict only the highest-risk flows.
High-risk production flowsClose the app or block the sensitive action when the signal is high confidence.

Compatibility Notes