"Secrets in mobile apps are mostly harmless but sometimes one might leak important credentials."
Search results. Click on the package name to process.
0%
...
No secrets found, Scroll down for APIs
http://www.google.com/intl/en_uk/analytics/tos.html
http://schemas.android.com/apk/res/android
http://www.amazon.com/gp/mas/dl/android?p=
http://itunes.apple.com/gb/app/driving-theory-test/id492314577?mt=12
http://m.facebook.com/DeepRiverDev
https://plus.google.com/117682183577724142192
http://mobile.twitter.com/DeepRiverDev
http://apps.microsoft.com/windows/en-us/app/driving-theory-test/6e00a01c-daa2-4847-b119-bf4b92e75616
https://www.googleapis.com/auth/drive.file
https://www.googleapis.com/auth/drive.appdata
https://www.googleapis.com/auth/drive
https://www.googleapis.com/auth/drive.apps
https://www.googletagmanager.com
http://hostname/?
http://googleads.g.doubleclick.net/mads/static/mad/sdk/native/sdk-core-v40.html
http://media.admob.com/mraid/v1/mraid_app_interstitial.js)
http://media.admob.com/mraid/v1/mraid_app_interstitial.js
http://media.admob.com/mraid/v1/mraid_app_expanded_banner.js)
http://media.admob.com/mraid/v1/mraid_app_expanded_banner.js
http://media.admob.com/mraid/v1/mraid_app_banner.js)
http://media.admob.com/mraid/v1/mraid_app_banner.js
http://plus.google.com/
http://googleads.g.doubleclick.net/mads/static/sdk/native/sdk-core-v40.html
https://www.googleapis.com/auth/appstate
http://www.google.com
https://www.googleapis.com/auth/plus.login
https://www.googleapis.com/auth/plus.me
http://schemas.android.com/apk/lib/com.google.android.gms.plus
http://www.google-analytics.com/collect
http://goo.gl/naFqQk
https://ssl.google-analytics.com/collect
https://www.googleapis.com/auth/games
https://www.googleapis.com/auth/games.firstparty
facebook
google