You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+13-19Lines changed: 13 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,6 @@ freeRASP for React Native is a mobile in-app protection and security monitoring
9
9
# :notebook_with_decorative_cover: Table of contents
10
10
11
11
-[Overview](#overview)
12
-
-[Requirements](#requirements)
13
12
-[Usage](#usage)
14
13
-[(Optional) Create a new React Native demo application](#optional-create-a-new-react-native-demo-application)
15
14
-[Step 1: Install the plugin](#step-1-install-the-plugin)
@@ -65,13 +64,6 @@ Learn more about commercial features at [https://talsec.app](https://talsec.app)
65
64
66
65
Learn more about freemium freeRASP features at [GitHub main repository](https://github.com/talsec/Free-RASP-Community).
67
66
68
-
# Requirements
69
-
70
-
Following minimal version requirements have to be met
71
-
in order to run freeRASP in your app:
72
-
73
-
-`react-native` >= `0.65.3`
74
-
75
67
# Usage
76
68
77
69
We will guide you step-by-step, but you can always check the expected result in the example folder.
@@ -164,7 +156,7 @@ const config = {
164
156
165
157
-`packageName`_: string_ - package name of your app you chose when you created it
166
158
-`certificateHashes`_: string[]_ - hash of the certificate of the key which was used to sign the application. **Hash which is passed here must be encoded in Base64 form.** If you are not sure how to get your certificate hash, you can check out the guide on our [Github wiki](https://github.com/talsec/Free-RASP-Community/wiki/Getting-your-signing-certificate-hash-of-app). Multiple hashes are supported, e.g. if you are using a different one for the Huawei App Gallery.
167
-
-`supportedAlternativeStores`_: string[] | undefined_ - Google Play Store and Huawei AppGallery are supported out of the box, you **don't have to assign anything**. You can add other stores like the Samsung Galaxy Store in the example code (```com.sec.android.app.samsungapps```). For more information, visit the[Detecting Unofficial Installation](https://github.com/talsec/Free-RASP-Community/wiki/Threat-detection#detecting-unofficial-installation) wiki page.
159
+
-`supportedAlternativeStores`_: string[] | undefined_ - Google Play Store and Huawei AppGallery are supported out of the box, you **don't have to assign anything**. You can add other stores like the Samsung Galaxy Store in the example code (`com.sec.android.app.samsungapps`). For more information, visit the [Detecting Unofficial Installation](https://github.com/talsec/Free-RASP-Community/wiki/Threat-detection#detecting-unofficial-installation) wiki page.
168
160
169
161
1.`iosConfig`_: object | undefined_ - required for iOS devices, has following keys:
170
162
-`appBundleId`_: string_ - Bundle ID of your app
@@ -387,24 +379,26 @@ To receive Security Reports, fill out the _watcherMail_ field in [config](#confi
Talsec offers commercial plans on top of freeRASP (Business RASP+):
392
-
* No limits of Fair Usage Policy (100K App Downloads)
393
-
* No Data Collection from your app
394
-
* FinTech grade security, features and SLA (see more in [this post](https://github.com/orgs/talsec/discussions/5))
395
-
* Protect APIs and risk scoring by AppiCrypt®
385
+
386
+
- No limits of Fair Usage Policy (100K App Downloads)
387
+
- No Data Collection from your app
388
+
- FinTech grade security, features and SLA (see more in [this post](https://github.com/orgs/talsec/discussions/5))
389
+
- Protect APIs and risk scoring by AppiCrypt®
396
390
397
391
Learn more at [talsec.app](https://talsec.app).
398
392
399
393
Not to overlook, the one of the most valued commercial features is [AppiCrypt®](https://www.talsec.app/appicrypt) - App Integrity Cryptogram.
400
394
401
395
It allows easy-to-implement API protection and App Integrity verification on the backend to prevent API abuse:
402
396
403
-
-Bruteforce attacks
404
-
-Botnets
405
-
-API abuse by App impersonation
406
-
-Session-hijacking
407
-
-DDoS
397
+
- Bruteforce attacks
398
+
- Botnets
399
+
- API abuse by App impersonation
400
+
- Session-hijacking
401
+
- DDoS
408
402
409
403
It is a unified solution that works across all mobile platforms without dependency on external web services (i.e., without extra latency, an additional point of failure, and maintenance costs).
0 commit comments