Skip to content

Mobile Threat Intelligence Integration Overview

This section details how to integrate your application database with Pradeo Security's Mobile Threat Intelligence (MTI) platform. The MTI integration allows you to automatically analyze applications in your catalog, maintain a secure inventory, and apply consistent security policies.

Integration Objectives

Integrating with Pradeo Security's Mobile Threat Intelligence aims to:

  • Automatically analyze applications before or after deployment
  • Maintain an inventory of applications and their security status
  • Apply consistent security policies across your entire catalog
  • Detect threats in existing and new applications
  • Generate reports on the security posture of your application catalog

Key Capabilities

  • Centralized Applications Store - Access a database of pre-analyzed applications
  • Application Upload & Analysis - Submit your own applications for security analysis
  • Application Search - Find applications in our global database by name or package ID
  • Security Reports - Get detailed threat analysis including vulnerabilities, permissions, and data access patterns
  • Threat Detection - Identify malicious, suspicious, and vulnerable applications

Typical Data Flows

1. Check Centralized Applications Store

First, check if your application is already in the Pradeo Security centralized applications store:

bash
curl "https://api.pradeo-security.com/v2/applications-catalog/applications\
?take=1&skip=0&package=com.facebook.katana&system=android&version=15.0.1" \
  -H 'accept: application/json' \
  -H 'Content-Type: application/json' \
  -H "x-access-key: YOUR_ACCESS_KEY" \
  -H "x-secret-key: YOUR_SECRET_KEY"

Response:

json
{
  "count": 1,
  "results": [
    {
      "id": "<application-id>",
      "package": {
        "id": "<package-id>",
        "packageName": "com.facebook.katana",
        "system": "Android"
      },
      "version": "15.0.1",
      "md5": "<md5>",
      "sha1": "<sha1>",
      "sha256": "<sha256>",
      "name": "Facebook",
      "versionCode": "359",
      "size": "1688890"
    }
  ]
}

If you find your application, you can retrieve its security report.

2. If Application Not Found

If your application is not in the centralized store, use one of these strategies:

  • Submit an application binary - Upload the APK/IPA file for analysis
  • Search for the application - Search by name or package ID to find it in our database

Note: The process of finding and analyzing applications may take time as we locate the binary and perform security analysis. You can retry the initial query periodically to check for updates.

Next Steps

Integration Methods

Choose the approach that best fits your workflow:

  1. Application Upload - For applications you control, upload binaries for immediate analysis
  2. Database Search - Search our pre-analyzed database for common applications
  3. Batch Processing - Process multiple applications and generate reports at scale
  4. Webhook Integration - Receive notifications when analysis is complete

Best Practices

  • Upload applications in APK format (Android) or IPA format (iOS)
  • Include version information for accurate results
  • Regularly check for updated reports as analysis improves
  • Use application IDs consistently across your systems
  • Cache results to minimize API calls