Skip to content

MASTG-TEST-0288: Debugging Symbols in Native Binaries

Overview

This test checks whether the app includes debugging symbols in its native binaries. Debugging symbols can provide valuable information during reverse engineering and vulnerability analysis by exposing sensitive implementation details such as function names, variable names, and source file references.

Steps

  1. Run a static analysis ( Obtaining Debugging Information and Symbols) to retrieve any debugging information present in the native binaries.

Observation

The output should identify all instances of debugging information in the native binaries.

Evaluation

The test fails if debugging information is present in any native binary, including if actual debugging symbols were successfully extracted.