Android
- Insecure storage of cryptographic keys information
      
- A writable keystore
 - A writable keystore protected by a weak password
 - A readable file keystore
 - A readable keystore, protected by a weak password, with private keys
 - A readable keystore, protected by a weak password, with public keys
 - A readable keystore containing private keys protected by a weak password
 - Using a file keystore
 - A keystore, protected by a weak password, containing private keys
 - A keystore, protected by a weak password, containing public keys
 - A keystore containing private keys protected by a weak password
 
 - Transmission of sensitive information in Activity
 - Transmission of sensitive information in Service
 - Sending sensitive information over the network
 - Storing Sensitive Information
      
- Storing sensitive information in memory
 - Storing sensitive information in a public file outside the application's directory
 - Storing sensitive information in a public file inside the application's directory
 - Storing sensitive information in a private file outside the application's directory
 - Storing sensitive information in a private file inside the application's directory
 - Storing sensitive information in a public protected database
 - Storing sensitive information in a protected database
 - Storing sensitive information in a public unprotected database
 - Storing sensitive information in the application source code
 - Storage or use of previously found sensitive information
 - Storing sensitive information in the keyboard cache
 
 - Output of sensitive information into the system log
 - Insecure Signature Algorithm
 - Insufficient length of a signature key
 - Transmission of sensitive information in BroadcastReceiver
 - Transmission of sensitive information in SQL query parameters
 - Possibility to create a backup copy of the application
 - Application is not obfuscated
 - Weak database encryption password
 - Interception of the database encryption password
 - An application allows network connections via HTTP
 - Insecure networking configuration
 - Potential execution of arbitrary code within the application
 - Storing Cookie values in the standard WebView database
 - Storing a private key/certificate that is not protected by a password in the directory/resources of the application
 - Storing a public key/certificate in the directory/resources of the application
 - Storing a private key/certificate protected by a password in the directory/resources of the application
 - Storing a key/certificate in the directory/resources of the application
 - Insecure settings in AndroidManifest.xml
 - Insecure settings in AndroidManifest.xml. The android:hasFragileUserData flag
 - Insecure settings in AndroidManifest.xml. The android:requestLegacyExternalStorage flag