Hey Product Hunt community!
We all push clean code to Google Play or App Store. But we know the reality: users download our apps from everywhere (APKPure, Aptoide, torrents, etc.).
I've been working on a security tool, APKFeed, and I realized something scary: Many "cracked" or "ad-free" versions of popular apps in the wild are injected with malware or have exposed API keys. But most developers never check these versions because it's hard to find and analyze them manually.
Hi Product Hunt! 👋
I’m Mert, maker of APKFeed.
Most mobile security tools focus on scanning the clean code sitting on your laptop. But that’s not where the danger is.
The real danger is in the "wild." Your app is likely being distributed on 3rd party distribution sites, leaked, and possibly modified.
The Problem: You push a clean build to Google Play or App Store. But a shadow version appears on unauthorized stores.
Is it the original APK? Has someone injected malware? Are your API keys exposed in that leaked version?
The Solution: APKFeed doesn't just scan what you upload. We find the leaked versions of your app across the web and run dynamic security analysis on THEM. We tell you exactly what risks your users are facing in the wild.
Launch Day Special: We want you to see the power of this analysis. For today’s launch, even on the Free Tier, we are unlocking Advanced Security Reports for every app you add.
-> Add your app.
-> Let us find the leaks.
-> Check your inbox! You will receive an email shortly once your comprehensive vulnerability report is ready (completely free for today).
Want to see what it looks like? Check out a sample report here: apkfeed.io/sample-report
I’m hanging out in the comments all day. Let me know: Have you ever checked the integrity of your app on 3rd party stores?
Mert, monitoring leaked APKs in the wild is such a needed layer of security. Does APKFeed also detect if code is tampered with (e.g., ads injected, API keys exposed) or just if the APK is being distributed?
@
@olajiggy321 , Spot on! detecting the distribution is just Step 1.
The core value of APKFeed is Step 2; Deep Analysis. We absolutely check for code tampering, injected ads/malware, and exposed API keys within those leaked APKs.
We treat the 'wild' version as a completely new threat surface and analyze it dynamically.
@imertavci
Thanks for confirming—deep analysis for code tampering is the real game-changer. That's the layer developers truly need.
I have a small, practical idea related to that deep analysis that you could try on your own.
If you're open to a suggestion, what's the best way to share it? (Email, DM, etc.)
@olajiggy321 That sounds amazing, your feedback is exactly why we are here.
Please feel free to email me directly at hello@apkfeed.io I’d love to hear your ideas
@imertavci
Sent kindly Check your inbox or spam