"Secrets in mobile apps are mostly harmless but sometimes one might leak important credentials."
Search results. Click on the package name to process.
0%
...
{"google_key": "AIzaSyDRKQ9d6kfsoZT2lUnZcZnBYvH69HExNPE"}
http://schemas.android.com/apk/res/android
https://pagead2.googlesyndication.com/pagead/gen_204?id=gmob-apps
https://www.googletagmanager.com
https://app-measurement.com/a
http://www.example.com
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/sdk-core-v40.html
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/mraid/v2/mraid_app_banner.js
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/mraid/v2/mraid_app_expanded_banner.js
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/mraid/v2/mraid_app_interstitial.js
https://csi.gstatic.com/csi
https://www.google.com/dfp/linkDevice
https://www.google.com/dfp/inAppPreview
https://www.google.com/dfp/debugSignals
https://www.google.com/dfp/sendDebugData
http://goo.gl/8Rd3yj
https://pagead2.googlesyndication.com/pagead/gen_204
http://www.google.com
http://www.google-analytics.com
https://ssl.google-analytics.com
https://www.googleapis.com/auth/appstate
https://www.googleapis.com/auth/datastoremobile
https://www.googleapis.com/auth/drive.appdata
https://www.googleapis.com/auth/drive.file
https://www.googleapis.com/auth/fitness.activity.read
https://www.googleapis.com/auth/fitness.activity.write
https://www.googleapis.com/auth/fitness.body.read
https://www.googleapis.com/auth/fitness.body.write
https://www.googleapis.com/auth/fitness.location.read
https://www.googleapis.com/auth/fitness.location.write
https://www.googleapis.com/auth/fitness.nutrition.read
https://www.googleapis.com/auth/fitness.nutrition.write
https://www.googleapis.com/auth/games
https://www.googleapis.com/auth/plus.login
https://www.googleapis.com/auth/plus.me
http://plus.google.com/
google