εxodus (not up to date but…)
But F-Droid apps are scanned with Exodus tooling already, and that covers actual code, classes, of known tracking and bad stuff. Not just random strings from the app.
I wouldn’t call that a random scanner ImmuniWeb wiki
If I’d make an app that had in code the text “This app does not connect to https://facebook.com” then that scanner will report that it literally connects to facebook.com…
As for false positives, It only says external communication.
But that’s a LIE. To check for “external communication” one needs to RUN the app on a real or emulated device and then capture the network connections. Do they do that? I think not…
Only a community free edition but also have security rating.
Care to explain this phrase?
Second, I don’t know you. Some rather objective scanner reveals much more.
They are not objective, they want to sell their snake-oil, and they do this with FUD.
Like the other post about conspiracy said, we should treat all apps with caution. I think these tools should be shared, including the one you gave, especially among those like me who don’t understand coding.
I agree, I still await for that report that we can take on serious.
Third, excuse me did I miss any post? What is the Fdroid process? I thought it’s all free here.
Yes, the code is free, everything needs to be transparent, no secrets, no sneaking around. No closed source dependencies. And any “user unfriendly” features need to be marked and advertised front and center: Build Metadata Reference | F-Droid - Free and Open Source Android App Repository
To find these and other, we analyze the apps, we run them, test them, as much as possible. Do things evade our detection? Does new info arise? Yes, and we go back and nuke any bad versions, and fix what can be fixed.