MASTG-TEST-0288: Debugging Symbols in Native Binaries
Overview¶
This test checks whether the app includes debugging symbols in its native binaries. Debugging symbols can provide valuable information during reverse engineering and vulnerability analysis by exposing sensitive implementation details such as function names, variable names, and source file references.
Steps¶
- Run a static analysis ( Obtaining Debugging Information and Symbols) to retrieve any debugging information present in the native binaries.
Observation¶
The output should identify all instances of debugging information in the native binaries.
Evaluation¶
The test fails if debugging information is present in any native binary, including if actual debugging symbols were successfully extracted.