How to De-obfuscate Android Obfuscated App Logic Stack Traces using Sentry SDK
What is Sentry?
Sentry is a lightweight, real-time crash reporting tool that helps developers track, prioritize, and fix stability issues that diminish app quality. Its integration with Appdome’s security features allows for easier debugging of obfuscated code.
Overview of Sentry Stack Traces with Appdome’s Obfuscate App Logic
Before diving into the de-obfuscation process, it’s important to understand the impact of integrating Appdome’s Obfuscate App Logic with Sentry. This integration results in obfuscated stack traces that are difficult to interpret without the appropriate de-obfuscation keys, thus safeguarding your app’s internal logic by making the stack traces difficult to read without proper de-obfuscation keys. The following sections of this article will guide you through the steps to automatically de-obfuscate these stack traces, starting with a glimpse at how an obfuscated stack trace looks prior to de-obfuscation.
Obfuscate Android Stack Traces using Sentry
Combining Appdome Android Obfuscate App Logic with Sentry will result in obfuscated stack traces in Sentry.
For manual deobfuscation, please follow How to Deobfuscate Crash Stack Traces for Debugging Android Apps when using Obfuscate App Logic
Preparing Your App
To start with the de-obfuscation process, your app needs to first be obfuscated using Appdome’s Obfuscate App Logic security features.
Automatic De-obfuscation of Android Stack Traces Using Sentry
Step 1: Build the feature – Obfuscate App Logic.
Figure 1: Fusion Set that will contain the Obfuscate App Logic feature
Note: Naming the Fusion Set to correspond to the protection(s) selected is for illustration purposes only (not required).
Note: Annotating the Fusion Set to identify the protection(s) selected is optional only (not mandatory).
Figure 3: Obfuscate App Logic option
Figure 4: Fusion Set that displays the newly added Obfuscate App Logic protection
Step 2: Click on Workflow Summary:
Step 3: Download Obfuscation Mapping Files
Step 4: Locate the required files
- mapping.txt
Step 5: Locate your app-UUID from Sentry:
- If Sentry generated a UUID, it can be found in your project settings.
- If you generated a UDID on your own, it can be located in your Android project in ‘manifest.xml’.
For more details on how to generate a UUID, see Sentry documentation: How do I create a GUID / UUID?
Step 6: Run the following CLI command:
sentry-cli upload-proguard --uuid <you project UUID> <path/to/mapping.txt> --org <your organization> --project <project name which attached to the UUID>
From this point forward, every stack trace in Sentry related to this Appdome build will be automatically deobfuscated.
Related Articles:
- How to Obfuscate Java Code in Android Apps
- How to Obfuscate Kotlin Code in Android Apps
- How to Remove Debug Information, Anti-Reversing Android & iOS Apps
- How to Optimize File Size, Code Obfuscation Best Practices in Android & iOS Apps
How Do I Learn More?
If you have any questions, please send them our way at support.appdome.com or via the chat window on the Appdome platform.
Thank you!
Thanks for visiting Appdome! Our mission is to secure every app on the planet by making mobile app security easy. We hope we’re living up to the mission with your project.