added root and frida detection

This commit is contained in:
asif
2025-09-04 01:56:59 +05:30
parent aa5a7877e4
commit 1b684af3a8
6 changed files with 87 additions and 1 deletions

View File

@@ -0,0 +1,35 @@
import 'package:flutter/material.dart';
import 'package:flutter/services.dart';
import 'package:lottie/lottie.dart';
class SecurityErrorScreen extends StatelessWidget {
final String message;
const SecurityErrorScreen({Key? key, required this.message}) : super(key: key);
@override
Widget build(BuildContext context) {
return Scaffold(
body: Padding(
padding: const EdgeInsets.all(20.0),
child: Column(
mainAxisAlignment: MainAxisAlignment.center,
children: [
Lottie.asset('assets/animations/error.json', height: 200),
const SizedBox(height: 20),
Text(
message,
textAlign: TextAlign.center,
style: const TextStyle(fontSize: 18, fontWeight: FontWeight.w600),
),
const SizedBox(height: 40),
ElevatedButton(
onPressed: () => SystemChannels.platform.invokeMethod('SystemNavigator.pop'),
child: const Text('Okay'),
),
],
),
),
);
}
}

View File

@@ -1,5 +1,7 @@
import 'package:flutter/material.dart';
import 'package:flutter/services.dart';
import 'package:kmobile/features/security/security_error_screen.dart';
import 'package:kmobile/security/security_service.dart';
import 'di/injection.dart';
import 'app.dart';
@@ -12,6 +14,15 @@ void main() async {
DeviceOrientation.portraitDown,
]);
// Check for device compromise
final compromisedMessage = await SecurityService.deviceCompromisedMessage;
if (compromisedMessage != null) {
runApp(MaterialApp(
home: SecurityErrorScreen(message: compromisedMessage),
));
return;
}
// Initialize dependencies
await setupDependencies();
runApp(const KMobile());

View File

@@ -0,0 +1,31 @@
import 'dart:io';
import 'package:jailbreak_root_detection/jailbreak_root_detection.dart';
class SecurityService {
static Future<String?> get deviceCompromisedMessage async {
final isNotTrust = await JailbreakRootDetection.instance.isNotTrust;
if (isNotTrust) {
return 'Your device is rooted or jailbroken. For security reasons, you cannot access our services on a compromised device.';
}
final isRealDevice = await JailbreakRootDetection.instance.isRealDevice;
if (!isRealDevice) {
return 'Emulators are not allowed to access our services. Please use a real device.';
}
if (Platform.isAndroid) {
try {
final isOnExternalStorage =
await JailbreakRootDetection.instance.isOnExternalStorage;
if (isOnExternalStorage) {
return 'The application cannot be run from external storage.';
}
} catch (e) {
// Ignore
}
}
return null;
}
}