2.8.0 • Published 1 year ago

jail-monkey v2.8.0

Weekly downloads
10,127
License
MIT
Repository
github
Last release
1 year ago

WARNING: I don't have the devices to test anymore, so testing is done by those submitting PRs bona fide.

Jail Monkey

Version Downloads

Can you ever really trust a phone?

Why?

Are users claiming they are crossing the globe in seconds and collecting all the Pokeballs? Some apps need to protect themselves in order to protect data integrity. JailMonkey allows you to:

  • Identify if a phone has been jail-broken or rooted for iOS/Android.
  • Detect mocked locations for phones set in "developer mode".
  • (ANDROID ONLY) Detect if the application is running on external storage such as an SD card.

Use

import JailMonkey from 'jail-monkey'

if (JailMonkey.isJailBroken()) {
  // Alternative behaviour for jail-broken/rooted devices.
}

Circle of Trust

API

MethodReturnsDescription
isJailBrokenbooleanis this device jail-broken/rooted.
canMockLocationbooleanCan this device fake its GPS location.
trustFallbooleanChecks if the device violates either isJailBroken or canMockLocation.
isDebuggedModePromise<boolean>Is the application is running in debug mode. Note that this method returns a Promise.

iOS Only APIs

MethodReturnsDescription
jailBrokenMessagestringReturns the reason for jailbroken detection. Will return an empty string on Android.

Android Only APIs

MethodReturnsDescription
hookDetectedbooleanDetects if there is any suspicious installed applications.
isOnExternalStoragebooleanIs the application running on external storage (ie. SD Card)
AdbEnabledbooleanIs Android Debug Bridge enabled.
isDevelopmentSettingsModePromise<boolean>Whether user has enabled development settings on their device. Note that this method returns a Promise.
androidRootedDetectionMethodsRootedDetectionMethodsReturns an object with the results of all the Android rooted detection methods for more granular detection, this can be helpful if some devices are giving false positives.
type RootedDetectionMethods = {
  rootBeer: {
    detectRootManagementApps: boolean;
    detectPotentiallyDangerousApps: boolean;
    checkForSuBinary: boolean;
    checkForDangerousProps: boolean;
    checkForRWPaths: boolean;
    detectTestKeys: boolean;
    checkSuExists: boolean;
    checkForRootNative: boolean;
    checkForMagiskBinary: boolean;
  },
  jailMonkey: boolean;
}

On iOS all of the Android only methods will return false or Promise<false> where appropriate.

:exclamation: Since emulators are usually rooted, you might want to bypass these checks during development. Unless you're keen on constant false alarms :alarm_clock:

Install

npm i jail-monkey --save
react-native link # Not required as of React Native 0.60.0

for iOS:

cd ios && pod install

If you use rnpm, you may have trouble as rnpm does not link Android properly after 0.29.0!

Note: On Android you should include location.isFromMockProvider() from your location provider to compliment JailMonkey.canMockLocation(). Most react-native location libraries already have this check built in

Additional Info

This has been made public to help keep it up to date. As detection measures get better or out-dated, please send updates to this project so it can be the best method of detection.

Special thanks to this fantastic blog article: http://blog.geomoby.com/2015/01/25/how-to-avoid-getting-your-location-based-app-spoofed/

2.8.0

1 year ago

2.7.0

2 years ago

2.6.0

3 years ago

2.5.0

3 years ago

2.4.1

3 years ago

2.4.2

3 years ago

2.4.0

3 years ago

2.3.4

3 years ago

2.3.3

4 years ago

2.3.2

4 years ago

2.3.1

5 years ago

2.3.0

5 years ago

2.2.0

5 years ago

2.1.1

5 years ago

2.0.0

5 years ago

1.0.0

6 years ago

0.2.0

6 years ago

0.1.0

7 years ago

0.0.9

7 years ago

0.0.8

7 years ago

0.0.6

8 years ago

0.0.5

8 years ago

0.0.4

8 years ago

0.0.3

8 years ago

0.0.2

8 years ago

0.0.1

8 years ago