Vulnerabilities
Bypass binary protections
Security misconfiguration
Insecure data storage
Intent attack surface
Deep link
Task hijacking
Tapjacking
Exploiting exported activities