How to De-obfuscate Android Obfuscated App Logic Stack Traces using Sentry

Last updated December 3, 2024 by Appdome

What is Sentry?

Sentry is a lightweight, real-time crash reporting tool that helps developers track, prioritize, and fix stability issues that diminish app quality. Its integration with Appdome’s security features allows for easier debugging of obfuscated code.

Overview of Sentry Stack Traces with Appdome’s Obfuscate App Logic

Before diving into the de-obfuscation process, it’s important to understand the impact of integrating Appdome’s Obfuscate App Logic with Sentry. This integration results in obfuscated stack traces that are difficult to interpret without the appropriate de-obfuscation keys, thus safeguarding your app’s internal logic by making the stack traces difficult to read without proper de-obfuscation keys. The following sections of this article will guide you through the steps to automatically de-obfuscate these stack traces, starting with a glimpse at how an obfuscated stack trace looks prior to de-obfuscation.

Before Sentry De-Obfuscation

Picture1 (1)

For manual de-obfuscation, please follow How to Deobfuscate Crash Stack Traces for Debugging Android Apps when using Obfuscate App Logic.

Preparing Your App

To start with the de-obfuscation process, your app first needs to be obfuscated using Appdome’s Obfuscate App Logic security features.

Prerequisites for Using Appdome’s Obfuscate App Logic Plugins:

To use Appdome’s mobile app security build system to Obfuscate App Logic, you’ll need:

How to Implement Obfuscate App Logic in Android Apps Using Appdome

On Appdome, follow these 3 simple steps to create self-defending Android Apps that Obfuscate App Logic without an SDK or gateway:

1. Designate the mobile app to be protected.
1.1. Upload a mobile app via the Appdome Mobile Defense platform GUI or via Appdome’s DEV-API or CI/CD Plugins.
1.2. Android Formats: .apk or .aab
1.3. Obfuscate App Logic is compatible with Java, JS, C++, C#, Kotlin, Flutter, React Native, Unity, Xamarin, Cordova, and other Android apps.
2. Select the defense: Obfuscate App Logic
2.1. Create and name the Fusion Set (security template) that will contain the Obfuscate App Logic feature as shown below:
fusion set that contains Obfuscate App Logic

Figure 1: Fusion Set that will contain the Obfuscate App Logic feature
Note: Naming the Fusion Set to correspond to the protection(s) selected is for illustration purposes only (not required).

2.1.1 Follow the steps in sections 2.2 -2.2.2 of this article to add the Obfuscate App Logic to your Fusion Set via the Appdome Console.

2.1.2 When you select the Obfuscate App Logic, you’ll notice that the Fusion Set you created in step 2.1 now bears the icon of the protection category that contains Obfuscate App Logic.

Fusion set details

Figure 2: Fusion Set that displays the newly added Obfuscate App Logic protection.
Note: Annotating the Fusion Set to identify the protection(s) selected is optional only (not mandatory).

2.1.3 Open the Fusion Set Detail Summary by clicking the “…” symbol on the far-right corner of the Fusion Set. Copy the Fusion Set ID from the Fusion Set Detail Summary (as shown below):
fusion Set Detail Summary image

Figure 3: Fusion Set Detail Summary

2.1.4 Follow the instructions below to use the Fusion Set ID inside any standard mobile DevOps or CI/CD toolkit like Bitrise, Jenkins, Travis, Team City, Circle CI, or other systems:
2.1.4.1 Refer to the Appdome API Reference Guide for API building instructions.
2.1.4.2 Check Appdome’s GitHub Repository for sample APIs.

2.2 Add the Obfuscate App Logic to the security template
2.2.1 Navigate to Build >  Security tab >TOTALCode™ Obfuscation section in the Appdome Console.
2.2.2 Toggle On Obfuscate App Logic</span
Note: The checkmark feature De-Obfuscate Sentry Stack Traces is enabled by default, as shown below.

Deobfuscate Sentry Stack Traces

Figure 4: Selecting Obfuscate App Logic

2.3 Initiate the build command either by clicking Build My App or via your CI/CD.

How to Automatically De-Obfuscate Sentry Stack Traces

  1. Click on Workflow Summary
    Workflow Summary
  2. Download Obfuscation Mapping FilesDownload Obfuscation Mapping Files
  3. Locate the required files
    • mapping.txt

    Locate The Required Files

  4. Locate your app-UUID from Sentry.
    • The generated Sentry UUID can be found in your project settings.
      For more details on how to generate a UUID, see Sentry documentation: How do I create a GUID / UUID?
      ProGuard Mapping Files
    • If you generated a UDID on your own, it can be located in your Android project in ‘manifest.xml’.
      UUID

    5. Run the following CLI command:

sentry-cli upload-proguard --uuid <you project UUID> <path/to/mapping.txt> --org <your organization> --project <project name which attached to the UUID>

From this point forward, every stack trace in Sentry related to this Appdome build will be automatically de-obfuscated.

Related Articles:

How Do I Learn More?

If you have any questions, please send them our way at support.appdome.com or via the chat window on the Appdome platform.

Thank you!

Thanks for visiting Appdome! Our mission is to secure every app on the planet by making mobile app security easy. We hope we’re living up to the mission with your project.

Appdome

Want a Demo?

Mobile Code Obfuscation

TomWe're here to help
We'll get back to you in 24 hours to schedule your demo.