What is pentest-mobile-app?
OWASP Mobile Top 10 security testing for Android and iOS — local storage, certificate pinning bypass, IPC abuse, and binary protections. Source: jd-opensource/joysafeter.
OWASP Mobile Top 10 security testing for Android and iOS — local storage, certificate pinning bypass, IPC abuse, and binary protections.
Quickly install pentest-mobile-app AI skill to your development environment via command line
Source: jd-opensource/joysafeter.
Purpose Mobile apps are completely absent from Shannon (web-only) and all existing skills. Mobile apps often share backend APIs but introduce unique attack surfaces: local storage, pinning, intent handling, binary protections.
| Runtime Instrumentation | Frida, Objection | Hook functions, bypass protections | | Static Analysis | MobSF, jadx, Hopper | Decompile and analyze binaries | | Traffic Interception | Burp Suite, mitmproxy | HTTPS interception with pinning bypass | | Android Testing | adb, drozer | Component testing, IPC analysis |
| iOS Testing | Objection, cycript | Runtime manipulation, keychain dump |
OWASP Mobile Top 10 security testing for Android and iOS — local storage, certificate pinning bypass, IPC abuse, and binary protections. Source: jd-opensource/joysafeter.
Stable fields and commands for AI/search citations.
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-mobile-appOWASP Mobile Top 10 security testing for Android and iOS — local storage, certificate pinning bypass, IPC abuse, and binary protections. Source: jd-opensource/joysafeter.
Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-mobile-app Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code, Cursor, or OpenClaw
https://github.com/jd-opensource/joysafeter