Security News
GitHub Removes Malicious Pull Requests Targeting Open Source Repositories
GitHub removed 27 malicious pull requests attempting to inject harmful code across multiple open source repositories, in another round of low-effort attacks.
@approov/react-native-approov-3.0.0-alpha
Advanced tools
Approov Mobile App Protection for ReactNative
This quickstart is written specifically for Android and iOS apps that are implemented using React Native
and the React Native Networking
, including any networking based on the XMLHttpRequest API
so including frisbee
and axios
. If this is not your situation then check if there is a more relevant quickstart guide available.
This quickstart provides the basic steps for integrating Approov into your app. A more detailed step-by-step guide using a Shapes App Example is also available.
To follow this guide you should have received an onboarding email for a trial or paid Approov account.
The Approov npm package provides a special check command to see if the app is ready for integration. Execute this using npx in the top level directory of your app:
npx @approov/react-native-approov check
Note, although the
npx
command may ask to install the package it is not permanently added to your app.
The output provides a checklist and reports any issues. Fix any errors reported, such as version updates or extra permissions. On Android, for example, the minimum SDK is 21, and the additional ACCESS_NETWORK_STATE
permission is required. Please read this section of the reference documentation if targeting Android 11 (API level 30) or above.
Once all issues are fixed, you should rerun your app to verify it is working as before. You are now ready to add Approov protection.
Add the Approov package to your existing App with the following command:
npm install @approov/react-native-approov
For iOS you must also install pod dependencies. Change directory to ios
and type:
pod install
In order to use Approov you must initialize it when your app is started. Import the required native modules as follows:
import {NativeModules} from 'react-native';
const {ApproovService} = NativeModules;
Place the initialization code in your main Javascript file (typically App.js
) so that it is executed early during the startup of your app. This code should only be executed once and before making any networking calls that you want to protect with Approov:
ApproovService.initialize("<enter-your-config-string-here>")
.then(() => {
// initialization successful
})
.catch(error => {
// initialization error with reason in error.message
});
The <enter-your-config-string-here>
is a custom string that configures your Approov account access. This will have been provided in your Approov onboarding email.
Once the initialization is called, it is possible for any network requests to have Approov tokens or secret substitutions made. Initially you won't have set which API domains to protect, so the requests will be unchanged. It will have called Approov though and made contact with the Approov cloud service. You will see ApproovService
logging indicating UNKNOWN_URL
(Android) or unknown URL
(iOS).
On Android, you can see logging using logcat
output from the device. You can see the specific Approov output using adb logcat | grep ApproovService
. On iOS, look at the console output from the device using the Console app from MacOS. This provides console output for a connected simulator or physical device. Select the device and search for ApproovService
to obtain specific logging related to Approov.
Your Approov onboarding email should contain a link allowing you to access Live Metrics Graphs. After you've run your app with Approov integration you should be able to see the results in the live metrics within a minute or so. At this stage you could even release your app to get details of your app population and the attributes of the devices they are running upon.
To actually protect your APIs there are some further steps. Approov provides two different options for protection:
API PROTECTION: You should use this if you control the backend API(s) being protected and are able to modify them to ensure that a valid Approov token is being passed by the app. An Approov Token is short lived crytographically signed JWT proving the authenticity of the call.
SECRETS PROTECTION: If you do not control the backend API(s) being protected, and are therefore unable to modify it to check Approov tokens, you can use this approach instead. It allows app secrets, and API keys, to be protected so that they no longer need to be included in the built code and are only made available to passing apps at runtime.
Note that it is possible to use both approaches side-by-side in the same app, in case your app uses a mixture of 1st and 3rd party APIs.
See FAQ for answers to common questions about the integration and troubleshooting.
See REFERENCE for a complete list of all of the Approov related methods.
FAQs
Approov Mobile App Protection for ReactNative
The npm package @approov/react-native-approov-3.0.0-alpha receives a total of 0 weekly downloads. As such, @approov/react-native-approov-3.0.0-alpha popularity was classified as not popular.
We found that @approov/react-native-approov-3.0.0-alpha demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
GitHub removed 27 malicious pull requests attempting to inject harmful code across multiple open source repositories, in another round of low-effort attacks.
Security News
RubyGems.org has added a new "maintainer" role that allows for publishing new versions of gems. This new permission type is aimed at improving security for gem owners and the service overall.
Security News
Node.js will be enforcing stricter semver-major PR policies a month before major releases to enhance stability and ensure reliable release candidates.