Installation
Prerequisites
Install required dependencies before use:- macOS
- Ubuntu/Debian
When to Use
Use this plugin when you need to:- Audit Android applications for Firebase misconfigurations
- Test Firebase endpoints extracted from APKs (Realtime Database, Firestore, Storage)
- Check authentication security (open signup, anonymous auth, email enumeration)
- Enumerate Cloud Functions and test for unauthenticated access
- Perform mobile app security assessments involving Firebase backends
When NOT to Use
- Scanning apps you do not have explicit authorization to test
- Testing production Firebase projects without written permission
- You only need to extract Firebase config without testing (use manual grep/strings instead)
- For non-Android targets (iOS, web apps) - this skill is APK-specific
- When the target app does not use Firebase
Commands
/scan-apk
Scan Android APKs for Firebase security misconfigurations.Path to a single .apk file or directory containing multiple APKs
How It Works
Extract Firebase Config
Searches 7+ sources for Firebase configuration:
- google-services.json
- XML resources
- Assets directory
- Smali code
- DEX binary strings
- React Native bundles
- Flutter assets
Vulnerability Categories
The scanner tests 14 distinct vulnerability categories across 6 Firebase services:Authentication
Authentication
Realtime Database
Realtime Database
Firestore
Firestore
Storage
Storage
Cloud Functions
Cloud Functions
Remote Config
Remote Config
Tests if remote config parameters are publicly accessible
Key Features
Multi-Framework Support
Supports native Android, React Native, Flutter, and Cordova apps
Comprehensive Extraction
Extracts config from 7+ sources including raw DEX binary strings
14 Vulnerability Tests
Tests authentication, databases, storage, functions, and remote config
Automatic Cleanup
Removes test data created during scans
Usage Examples
- Single APK
- Directory of APKs
- Standalone Script
- No Cleanup
Output Reports
The scanner generates comprehensive reports:Text Report
Human-readable findings with:- Vulnerability descriptions
- Severity ratings
- Affected endpoints
- Remediation guidance
JSON Report
Machine-readable output for integration with other tools:Common Findings
Open Database Read Access
Open Database Read Access
Severity: CriticalDescription: The Firebase Realtime Database allows unauthenticated read access to data.Remediation:
Public Storage Bucket
Public Storage Bucket
Severity: CriticalDescription: Firebase Storage bucket allows public file listing and download.Remediation:
Anonymous Authentication Enabled
Anonymous Authentication Enabled
Severity: HighDescription: Anonymous authentication is enabled, potentially allowing abuse.Remediation:
- Disable anonymous auth if not needed
- Implement rate limiting
- Add additional access controls beyond authentication
Unauthenticated Cloud Functions
Unauthenticated Cloud Functions
Severity: MediumDescription: Cloud Functions can be invoked without authentication.Remediation:
Tested Endpoints
The scanner tests the following Firebase services:Common Cloud Functions Tested
The scanner automatically tests these common function names:- Authentication:
login,logout,register,signup,authenticate,verify - User Management:
createUser,deleteUser,updateUser,getUser,getUsers - Data Operations:
getData,setData,syncData,backup,restore - File Operations:
uploadFile,getFile,export,import - Notifications:
sendNotification,sendEmail,notify,push - Payment:
processPayment,createOrder,getOrders - API:
webhook,callback,api,admin - Monitoring:
debug,test,healthcheck,status,analytics
Best Practices
Authorization
Authorization
Scope
Scope
Clearly define the scope of testing with the application owner
Timing
Timing
Coordinate testing to avoid production impact
Documentation
Documentation
Document all findings with screenshots and reproduction steps
Responsible Disclosure
Responsible Disclosure
Follow responsible disclosure practices when reporting vulnerabilities
Limitations
- Platform-specific: Only works with Android APKs
- Firebase-only: Does not test other backend services
- Configuration extraction: May not find obfuscated or encrypted Firebase configs
- Dynamic analysis: Does not include runtime monitoring or traffic interception
Security Considerations
Output Directory Structure
Integration with Other Tools
The JSON output can be integrated with:- Security information and event management (SIEM) systems
- Continuous integration/continuous deployment (CI/CD) pipelines
- Vulnerability management platforms
- Custom reporting dashboards