Device scan analysis

Guide on how to view and analyze device scan results on the Redamp.io console and mobile device.

You can view the results of your device scan on the Redamp.io console or on your mobile device. On your mobile device, you can only see the latest scan results with a basic evaluation. For more detailed information, you need to use the Redamp.io console.

Every scan result is divided into four categories:

Top section

Top panel

Redamp.io | Device Detail (Top Panel)

On the left side of the top panel, you can see the device vendor and model name (OnePlus - vendor, Nord - model name).

On the right side of the top panel, you can see the date and time of the last scan and these buttons:

Device info

Redamp.io | Device Detail (Device Info)

Basic information about your device, system, and user.

Score panel

Redamp.io | Device Detail (Score Panel)

The score panel shows the overall score of the device in each category.

Overview tab

Redamp.io | Device Detail (Overview Tab)

Basic issues

Redamp.io | Device Detail (Basic Issues)

Each issue is assigned a severity (Low, Medium, or High), a number of affected devices, a title, and a description.

Clicking on the "plus" icon at the beginning of every row allows you to access more details about the issue. In the details, you can see a list of affected devices, a detailed description, a list of affected platforms, and a suggested solution for resolving the issue.

Sensor permissions

Sensor permissions show the status of the permissions required by the Redamp.io mobile app to perform a scan. If some permissions are not granted, we won't be able to perform a comprehensive scan of the device.

Android

Redamp.io | Device Detail (Sensor Permissions)

iOS

Redamp.io | Device Detail (Sensor Permissions)

Advanced issues

Redamp.io | Device Detail (Advanced Issues)

Advanced issues include CVEs (Common Vulnerabilities and Exposures) that have been assigned a CVE ID. CVEs are publicly known vulnerabilities assigned by the CVE Numbering Authority (CNA) to uniquely identify a specific vulnerability or exposure. These vulnerabilities or exposures are assigned a severity score (CVSS score) to determine their severity.

Each advanced issue is assigned a CVE ID, a severity score (based on the CVSS score), a publish date, and a CVE description.

Device tab

Redamp.io | Device Tab

Mobile platform

Redamp.io | Device Tab (Mobile Platform)

The mobile platform section describes the security status of the operating system version:

OS settings

Redamp.io | Device Tab (OS Settings)

The OS settings section describes the security status of the operating system settings:

Network tab

Redamp.io | Device Tab (Network Tab)

The Network tab displays a list of networks scanned by the device. You can view a brief security summary for each network.

Settings

Traffic security

Privacy tab

Redamp.io | Device Tab (Privacy Tab)

The Privacy tab displays a list of scanned email addresses for data breaches.

After clicking on the email address, you can view a data breach summary for each email address. Each data breach includes:

Apps tab

Redamp.io | Device Tab (Apps Tab)

The Apps tab displays a list of installed apps on the device. You can view a brief security summary for each app.

Risky applications

Redamp.io | Device Tab (Risky Apps)

Risky apps are known to be malicious, are no longer maintained, or were not installed from an official app store. We recommend keeping an eye on these apps and considering uninstalling them.

In verification applications

Redamp.io | Device Tab (In Verification Apps)

In verification apps are apps that are not yet verified by our team. Analysis of these apps is in progress and they will be moved either to the "risky" category or to the "verified" category.

Verified applications

Redamp.io | Device Tab (Verified Apps)

Verified apps are apps that are installed from the official app store and our analysis team did not find any security issues with them.

System applications

Redamp.io | Device Tab (System Apps)

System apps are apps that are installed by the manufacturer and are part of the operating system.