CPoC SDK is implemented with secure by design. There are a batch of security mechanisms applied on the SDK to protect from unauthorized access to service and sensitive data. As integrator, you should follow the best practise below to use our SDK to keep whole application in a secure state.
To ensure secure integration and usage of our SDK, follow these guidelines:
1. Secure SDK Integration
-
Obtain SDK from Official Sources Only
Always obtain the SDK from trusted repositories (MineSec Authorized channel) or verified private repositories. Avoid unverified third-party sources.
-
Keep SDK Updated
Regularly update to the latest SDK version to leverage security patches and bug fixes. Subscribe to our security advisory notifications.
-
Audit Dependencies
Review the SDK’s third-party dependencies (use
./gradlew dependencies
) to avoid libraries with known vulnerabilities.
2. Sensitive Data Handling
MineHades SDK handles sensitive data inside and wont export out sensitive data such as plaintext PIN. For integrator, when handling sensitive data in your application, please follow the suggestions below
-
Key & Credential Management
Use Android Keystore or server-side mechanisms to store secrets. Never hardcode sensitive data.
-
Secure Local Storage
- Use
EncryptedSharedPreferences
orEncryptedFile
(Android Jetpack Security) for sensitive data. - Avoid storing credentials, tokens, or PII in plaintext (e.g.,
SharedPreferences
or SQLite).
- Use
-
Erase upon use
- use ByteArray to handle the sensitive data and erase when it’s finished
3. Network Security
-
Enforce HTTPSConfigure
network_security_config.xml
:xml <network-security-config> <domain-config cleartextTrafficPermitted="false"> <domain includeSubdomains="true">your.api.domain</domain> </domain-config> </network-security-config>
-
Certificate PinningImplement SSL pinning during SDK initialization to mitigate MITM attacks.
4. Least Privilege Principle
-
Minimize PermissionsDeclare only necessary permissions in
AndroidManifest.xml
:xml <!-- Request location permission only if required --> <uses-permission android:name="android.permission.ACCESS_FINE_LOCATION" />
-
Runtime Permission Checks Request dangerous permissions (e.g., location, storage) at runtime and handle denials gracefully.