Description of Sobot SDK's Collection and Use of Personal Information

Welcome to use Sobot SDK! We fully understand the importance of personal information (PI) to you, and your trust is extremely significant to us. We will take corresponding security measures in strict accordance with the requirements of laws and regulations to ensure your PI secure and controllable.

The document aims to illustrate the PI collected and used by Sobot when mobile Internet applications (apps) access Sobot SDK and the security risk assessment of Sobot SDK.

I. Statement of Compliant Use of Sobot SDK
To ensure that your app is legally compliant, you must use Sobot SDK services in accordance with current laws, regulations or regulatory requirements and take the following three steps:
(1) Make sure you have upgraded Sobot SDK to the latest version that meets the new regulatory requirements.
(2) Configure delayed initialization to ensure that Sobot SDK is initialized after the user authorizes the Privacy Policy.
(3) Inform users of details of using Sobot SDK in the Privacy Policy.
Please be sure to follow the above steps to use Sobot SDK service in a compliant manner. Any risk caused by your failure to do so shall be borne by yourself.

II. PI Collected by Sobot SDK and Permissions Required
1. PI collected and used
To identify network status and account abnormalities and determine the suitability of products and services, we will collect the following information: Device and system information (including OS type, system edition/version, app package name, app version, device type, device manufacturer, and device model), Internet identity information (IP address), etc.
2. System permission obtained
To provide you with more convenient, better and personalized services and improve your experience, we may collect and use your PI by enabling system permissions for certain additional services we provide. If you do not agree to enable the relevant permissions, you can normally use the basic Sobot services, but you may not be able to obtain the user experience brought to you by these additional services. You can enable or disable these permissions at any time at your discretion.
The types of permissions requested and their uses are as follows:
(1) Camera permission
You can send photos and videos with this function after enabling camera permission.
(2) MIC permission
You can send voice messages with this function after enabling MIC permission.
(3) Call permission
When you use the Call Center, voice bot and other Sobot call product functions, you need to proactively provide a specific phone number and enable call permission to make or answer calls. After you use the above functions, we will store the caller and called numbers, talk time, talk records, etc.
(4) Storage permission
You can send/save photos, files and videos with this function after enabling the permission to allow apps to read/write to the external memory.

III. Sobot SDK Security Assessment
To prevent SDK risks and protect users' PI security, we conducted a security assessment of the main risk items of Sobot SDK with reference to the "Practice Guide for Network Security Standards - Security Guidelines for Mobile Internet Applications (Apps) Using Software Development Kits (SDKs)" issued by the Secretariat of the National Information Security Standardization Technical Committee, and the assessment results are shown in the following table:

Self-security vulnerability assessment

TypeNameStatusSelf-assessment (secure or not)
Source file securityJava code unobfuscation riskNoneYes
Private function call riskNoneYes
AES weak encryption vulnerabilityNoneYes
Insecure use vulnerability of RSA algorithmNoneYes
Insecure use of random numbersNoneYes
Sensitive function call riskNoneYes
Internal data interaction securityLow protection level custom permissionsNoneYes
Insecure use of PengdingIntentSecure useYes
Implicit Intent calls with sensitive infoNoneYes
Dynamically registered broadcast receiverNoneYes
FFmpeg file readingNoneYes
Intent Scheme URLs attackNoneYes
Provider file directory traversalNoneYes
Fragment injectionNoneYes
Webview does not remove the hidden APINoneYes
Webview saves passwords in plaintextNoneYes
Activity binds browserable with custom protocolsNoneNo
Clipboard read/write operation vulnerability detectionYes (message replication)Yes
Communication data transmission securitySSL communication server/client detection trusts in any certificatesNoneNo
HTTPS disables host name verificationYesYes
Webview has a native Java APINoneYes
Webview ignores SSL certificate errorNoneYes
Open socket portNoneYes
Webview enables access to file dataNoneYes
Local data storage securitygetdir read/write permissions configuration errorYesYes
Global file read/write permissions configuration errorYesYes
Profile read/write permissions configuration errorYesYes
AES/DES hard-coded keysNoneYes
Opened or created database files permission configuration errorNoneYes

Malicious behavior assessment

Behavior name
Note
Exist or not
Traffic hijackingSDK information pulling, reporting and displaying targets are different from those set by the app provider, and maliciously hijacking app traffic may cause damage to the app.None
Expense consumptionSDK can cause financial losses to users by consuming their network subscriptions, sending malicious chargeable SMS and subscribing to chargeable services.None
Privacy theftSDK stealthily steals users' contact list, SMS and other sensitive PI without their awareness or misinformation, and surreptitiously takes photos, recordings and other sensitive behaviors to send to malicious developers.None
Silent downloadSDK silently downloads and installs other malware, viruses or Trojans in the backend.None
Fraud traffic via adsSDK simulates human clicks on advertising links in the backend for profit without the user's knowledge.None
Malicious adsSDK pushes advertising links containing fraudulent content, viruses and Trojans to users, and pushes excessive ads, which occupy the system notification bar and screen for a long time and interfere with users' normal use of the app.None
BlackmailSDK maliciously encrypts files on the user's phone, interferes with the user's normal use of the phone, and blackmails the user for money on the pretext of restoring the normal use of their phones.None
MiningSDK utilizes the computing power of the user's phone to obtain cryptocurrency for the attacker without the user's knowledge, causing a performance penalty to the user's device hardware.None
Remote controlSDK starts a local backend server on the cell phone to receive control commands from the remote console and perform other malicious behaviors covertly as described above.None
Clipboard hijackingSDK listens to the system clipboard to obtain sensitive information in the clipboard, or triggers a floating window based on content changes in the clipboard, thus interfering with system functions, deceiving users, or affecting the normal use of other apps.None