Skip to content

Application Submission

This section details how to submit applications to Pradeo Security for analysis through the Mobile Threat Intelligence platform.

Overview

You can submit applications in two ways:

  1. Upload Application Binary - Submit APK/IPA files directly for analysis
  2. Search Application Database - Search for applications already in our database

Upload Application Binary

Submit an application binary by uploading it to the centralized applications store.

Requirements

  • File format: APK (Android) or IPA (iOS)
  • Valid application binary
  • Proper authentication headers

API Endpoint

bash
POST /v2/applications-catalog/upload

Example Request

bash
curl -X POST "https://api.pradeo-security.com/v2/applications-catalog/upload" \
  -H "x-access-key: YOUR_ACCESS_KEY" \
  -H "x-secret-key: YOUR_SECRET_KEY" \
  -F "app=@/path/to/your/app.apk"

Response

json
{
  "id": "<application-id>",
  "status": "processing",
  "createdAt": "2024-01-15T10:00:00Z"
}

Track ID: Save this ID to monitor the submission status. The application is queued for analysis in our centralized applications store.

Processing

Once uploaded:

  1. The application is transferred to our centralized applications store
  2. Our system analyzes the binary for security threats
  3. A detailed report is generated with findings
  4. You can retrieve the report using the application ID

Note: Analysis may take time depending on application size and queue. Check back periodically using the application ID.

Search Application Database

Search for applications already in our database.

API Endpoint

bash
POST /v2/applications-catalog/search

Search by Package Name

bash
curl -X POST "https://api.pradeo-security.com/v2/applications-catalog/search" \
  -H 'Content-Type: application/json' \
  -H "x-access-key: YOUR_ACCESS_KEY" \
  -H "x-secret-key: YOUR_SECRET_KEY" \
  -d '{
    "search": "com.facebook.katana"
  }'

Search by Application Name

bash
curl -X POST "https://api.pradeo-security.com/v2/applications-catalog/search" \
  -H 'Content-Type: application/json' \
  -H "x-access-key: YOUR_ACCESS_KEY" \
  -H "x-secret-key: YOUR_SECRET_KEY" \
  -d '{
    "search": "Facebook"
  }'

Response

json
{
  "id": "<track-id>",
  "status": "searching",
  "createdAt": "2024-01-15T10:00:00Z"
}

The search will crawl our database looking for matching applications. If found, results will be available for retrieval.

Best Practices

  • Format: Ensure applications are in valid APK/IPA format
  • Version Information: Include version details for accurate matching
  • Batch Processing: Submit multiple applications efficiently
  • Track IDs: Save track IDs for monitoring progress
  • Retry Logic: Implement exponential backoff when checking analysis status
  • Error Handling: Handle cases where applications cannot be analyzed

Error Handling

Common Errors

Status CodeMeaningSolution
400Bad RequestCheck request format and parameters
401UnauthorizedVerify access key and secret key
403ForbiddenCheck permission level and features enabled
404Not FoundApplication may not exist in database
413Payload Too LargeApplication binary exceeds size limit

Next Steps