Description of Sobot SDK's Collection and Use of Personal Information

Welcome to use Sobot SDK! We fully understand the importance of personal information (PI) to you, and your trust is extremely significant to us. We will take corresponding security measures in strict accordance with the requirements of laws and regulations to ensure your PI secure and controllable.

The document aims to illustrate the PI collected and used by Sobot when mobile Internet applications (apps) access Sobot SDK and the security risk assessment of Sobot SDK.

I. Statement of Compliant Use of Sobot SDK
To ensure that your app is legally compliant, you must use Sobot SDK services in accordance with current laws, regulations or regulatory requirements and take the following three steps:
(1) Make sure you have upgraded Sobot SDK to the latest version that meets the new regulatory requirements.
(2) Configure delayed initialization to ensure that Sobot SDK is initialized after the user authorizes the Privacy Policy.
(3) Inform users of details of using Sobot SDK in the Privacy Policy.
Please be sure to follow the above steps to use Sobot SDK service in a compliant manner. Any risk caused by your failure to do so shall be borne by yourself.

II. PI Collected by Sobot SDK and Permissions Required
1. PI collected and used
To identify network status and account abnormalities and determine the suitability of products and services, we will collect the following information: Device and system information (including OS type, system edition/version, app package name, app version, device type, device manufacturer, and device model), Internet identity information (IP address), etc.
2. System permission obtained
To provide you with more convenient, better and personalized services and improve your experience, we may collect and use your PI by enabling system permissions for certain additional services we provide. If you do not agree to enable the relevant permissions, you can normally use the basic Sobot services, but you may not be able to obtain the user experience brought to you by these additional services. You can enable or disable these permissions at any time at your discretion.
The types of permissions requested and their uses are as follows:
(1) Camera permission
You can send photos and videos with this function after enabling camera permission.
(2) MIC permission
You can send voice messages with this function after enabling MIC permission.
(3) Call permission
When you use the Call Center, voice bot and other Sobot call product functions, you need to proactively provide a specific phone number and enable call permission to make or answer calls. After you use the above functions, we will store the caller and called numbers, talk time, talk records, etc.
(4) Storage permission
You can send/save photos, files and videos with this function after enabling the permission to allow apps to read/write to the external memory.

III. Sobot SDK Security Assessment
To prevent SDK risks and protect users' PI security, we conducted a security assessment of the main risk items of Sobot SDK with reference to the "Practice Guide for Network Security Standards - Security Guidelines for Mobile Internet Applications (Apps) Using Software Development Kits (SDKs)" issued by the Secretariat of the National Information Security Standardization Technical Committee, and the assessment results are shown in the following table:

Self-security vulnerability assessment

Type Name Status Self-assessment (secure or not)
Source file security Java code unobfuscation risk None Yes
Private function call risk None Yes
AES weak encryption vulnerability None Yes
Insecure use vulnerability of RSA algorithm None Yes
Insecure use of random numbers None Yes
Sensitive function call risk None Yes
Internal data interaction security Low protection level custom permissions None Yes
Insecure use of PengdingIntent Secure use Yes
Implicit Intent calls with sensitive info None Yes
Dynamically registered broadcast receiver None Yes
FFmpeg file reading None Yes
Intent Scheme URLs attack None Yes
Provider file directory traversal None Yes
Fragment injection None Yes
Webview does not remove the hidden API None Yes
Webview saves passwords in plaintext None Yes
Activity binds browserable with custom protocols None No
Clipboard read/write operation vulnerability detection Yes (message replication) Yes
Communication data transmission security SSL communication server/client detection trusts in any certificates None No
HTTPS disables host name verification Yes Yes
Webview has a native Java API None Yes
Webview ignores SSL certificate error None Yes
Open socket port None Yes
Webview enables access to file data None Yes
Local data storage security getdir read/write permissions configuration error Yes Yes
Global file read/write permissions configuration error Yes Yes
Profile read/write permissions configuration error Yes Yes
AES/DES hard-coded keys None Yes
Opened or created database files permission configuration error None Yes

Malicious behavior assessment

Behavior name
Note
Exist or not
Traffic hijacking SDK information pulling, reporting and displaying targets are different from those set by the app provider, and maliciously hijacking app traffic may cause damage to the app. None
Expense consumption SDK can cause financial losses to users by consuming their network subscriptions, sending malicious chargeable SMS and subscribing to chargeable services. None
Privacy theft SDK stealthily steals users' contact list, SMS and other sensitive PI without their awareness or misinformation, and surreptitiously takes photos, recordings and other sensitive behaviors to send to malicious developers. None
Silent download SDK silently downloads and installs other malware, viruses or Trojans in the backend. None
Fraud traffic via ads SDK simulates human clicks on advertising links in the backend for profit without the user's knowledge. None
Malicious ads SDK pushes advertising links containing fraudulent content, viruses and Trojans to users, and pushes excessive ads, which occupy the system notification bar and screen for a long time and interfere with users' normal use of the app. None
Blackmail SDK maliciously encrypts files on the user's phone, interferes with the user's normal use of the phone, and blackmails the user for money on the pretext of restoring the normal use of their phones. None
Mining SDK utilizes the computing power of the user's phone to obtain cryptocurrency for the attacker without the user's knowledge, causing a performance penalty to the user's device hardware. None
Remote control SDK starts a local backend server on the cell phone to receive control commands from the remote console and perform other malicious behaviors covertly as described above. None
Clipboard hijacking SDK listens to the system clipboard to obtain sensitive information in the clipboard, or triggers a floating window based on content changes in the clipboard, thus interfering with system functions, deceiving users, or affecting the normal use of other apps. None