"Secrets in mobile apps are mostly harmless but sometimes one might leak important credentials."
Search results. Click on the package name to process.
0%
...
<string name="default_web_client_id">365598272257-3eg0bruvp2cuqohcftlah6pfalmdh7ea.apps.googleusercontent.com</string>
<string name="google_api_key">AIzaSyCLqFaG4aHEctFp0f--g9ILN3yjVLoKNtg</string>
<string name="google_app_id">1:365598272257:android:407a24b1054c861e</string>
<string name="google_crash_reporting_api_key">AIzaSyCLqFaG4aHEctFp0f--g9ILN3yjVLoKNtg</string>
{"google_key": "AIzaSyDRKQ9d6kfsoZT2lUnZcZnBYvH69HExNPE"}
https://useful-knots.firebaseio.com
http://useknots.com/privacy_policy_usefulknots.html
http://useknots.com
http://schemas.android.com/apk/res/android
https://www.facebook.com/useknots/
https://adservice.google.com/getconfig/pubvendors
https://pagead2.googlesyndication.com/pagead/gen_204?id=gmob-apps
https://goo.gl/fQ2neu
https://goo.gl/h17b6x.
https://support.google.com/dfp_premium/answer/7160685#push
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/sdk-core-v40.html
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/production/sdk-core-v40-impl.js
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/mraid/v2/mraid_app_banner.js
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/mraid/v2/mraid_app_expanded_banner.js
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/mraid/v2/mraid_app_interstitial.js
https://csi.gstatic.com/csi
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/native_ads.html
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/production/native_ads.js
https://imasdk.googleapis.com/admob/sdkloader/native_video.html
https://www.google.com/dfp/linkDevice
https://www.google.com/dfp/inAppPreview
https://www.google.com/dfp/debugSignals
https://www.google.com/dfp/sendDebugData
http://www.example.com
https://pagead2.googlesyndication.com/pagead/gen_204
http://www.google.com
https://goo.gl/J1sWQy
branch
fabric
google
unity