Appearance
Mobile Threat Intelligence Integration Overview
This section details how to integrate your application database with Pradeo Security's Mobile Threat Intelligence (MTI) platform. The MTI integration allows you to automatically analyze applications in your catalog, maintain a secure inventory, and apply consistent security policies.
Integration Objectives
Integrating with Pradeo Security's Mobile Threat Intelligence aims to:
- Automatically analyze applications before or after deployment
- Maintain an inventory of applications and their security status
- Apply consistent security policies across your entire catalog
- Detect threats in existing and new applications
- Generate reports on the security posture of your application catalog
Key Capabilities
- Centralized Applications Store - Access a database of pre-analyzed applications
- Application Upload & Analysis - Submit your own applications for security analysis
- Application Search - Find applications in our global database by name or package ID
- Security Reports - Get detailed threat analysis including vulnerabilities, permissions, and data access patterns
- Threat Detection - Identify malicious, suspicious, and vulnerable applications
Typical Data Flows
1. Check Centralized Applications Store
First, check if your application is already in the Pradeo Security centralized applications store:
bash
curl "https://api.pradeo-security.com/v2/applications-catalog/applications\
?take=1&skip=0&package=com.facebook.katana&system=android&version=15.0.1" \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-H "x-access-key: YOUR_ACCESS_KEY" \
-H "x-secret-key: YOUR_SECRET_KEY"Response:
json
{
"count": 1,
"results": [
{
"id": "<application-id>",
"package": {
"id": "<package-id>",
"packageName": "com.facebook.katana",
"system": "Android"
},
"version": "15.0.1",
"md5": "<md5>",
"sha1": "<sha1>",
"sha256": "<sha256>",
"name": "Facebook",
"versionCode": "359",
"size": "1688890"
}
]
}If you find your application, you can retrieve its security report.
2. If Application Not Found
If your application is not in the centralized store, use one of these strategies:
- Submit an application binary - Upload the APK/IPA file for analysis
- Search for the application - Search by name or package ID to find it in our database
Note: The process of finding and analyzing applications may take time as we locate the binary and perform security analysis. You can retry the initial query periodically to check for updates.
Next Steps
- Application Submission - Upload and analyze your applications
- Security Reports - Retrieve detailed analysis reports
- API Reference - Complete API documentation
Integration Methods
Choose the approach that best fits your workflow:
- Application Upload - For applications you control, upload binaries for immediate analysis
- Database Search - Search our pre-analyzed database for common applications
- Batch Processing - Process multiple applications and generate reports at scale
- Webhook Integration - Receive notifications when analysis is complete
Best Practices
- Upload applications in APK format (Android) or IPA format (iOS)
- Include version information for accurate results
- Regularly check for updated reports as analysis improves
- Use application IDs consistently across your systems
- Cache results to minimize API calls
