
Tapjacking Detection (BETA)
Android 15 hardens OS; apps must still block obscured touches.
AES Timeout
New
-aes-timeout
flag (default 5 minutes) prevents stalls during key analysis.
JSON Reporting
Use
-json <file>
for structured, machine-readable output. CSV has been removed.
This tool is designed to identify Android apps that could be vulnerable to the Permission-Slip attack (a Confused Deputy scenario leading to elevated permissions).
- Exported component triage (CALL, VIEW+
javascript:
, weak custom permissions) - Tapjacking/TapTrap detection (Compose & XML; missing obscured-touch filtering)
- ADB POC commands for quick validation
- HTML + JSON reports with Tapjacking Portfolio
- Severity & Confidence (0–100) scoring
-allsafe
mode skips AES for fast sweeps

git clone https://github.com/actuator/pSlip.git
cd pSlip
sudo apt install apktool jadx
# Directory sweep
python pSlip.py . -all -html demo.html -json demo.json
# Fast sweep (skip AES/jadx)
python pSlip.py path/to/apks -allsafe -html report.htm
Flags:
-p
, -perm
, -js
, -call
, -aes
, -taptrap
, -json <file>
, -all
, -allsafe
, -aes-timeout <minutes>
login | auth | verify | pay | checkout | approve | password | otp | pin | confirm | secure | submit | card | transfer | send
- HTML: Tapjacking Portfolio (one line per app) + detailed findings
- JSON: Full vulnerability details (machine-readable)

- Added Tapjacking/TapTrap detector (Compose + XML)
- New
-aes-timeout
flag (default 5 minutes) - Added JSON reporting (
-json <file>
); removed CSV - Improved scoring and output clarity
Pull requests are welcome. For major changes, please open an issue first to discuss your proposal.