Flutter Hackers: Uncovering the Dev’s Myopia (Part 1)

Life hack for understanding Flutter Application through source code leaks

This writings is a bridging prerequisites before diving deeper into reverse-engineering and leveraging an unknown vulnerability in a Flutter Android Application for bug bounty or penetration testing

Many frameworks have opened the ease of developing a mobile application today. There are a lot of various framework with different programming language that sits on top of them. Java is chosen as the one for basic Android Development since it’s pretty easy to learn and sticks to its main purpose although they only use it as a syntax but Android itself isn’t compiled to JVM. And once we’re talking about Android NDK, C/C++ will also be discussed since we’ll also talk about native applications and et cetera.

But what if instead, we use Dart language to develop an Android Application? In case you’ve heard it just now, Dart is a programming language that has been believed to be optimized at client-side and the output of this program may be supported on any platform. Dart itself is developed by Google and some says that this programming language is beginner-friendly.

Then it comes another component called Flutter. It’s originally an UI Development Kit, but it uses Dart as a backend bridges for communication between the package’s components. That’s why Flutter has its own GUI rendering and the developer has its own free-will to control all of those layouts at ease and it’s really fast since Flutter relies on JIT (Just-In Time) for development without intermediary bridge. Dart has

Read more

Explore the site

More from the blog

Latest News