iamjosephmj

Open-source Android device-intelligence telemetry SDK. Hardware-backed key attestation, bootloader integrity, root indicators, in-process tampering, emulator probe, app-cloner signals — emitted as a single deterministic JSON report. Telemetry, not RASP.

12
1
100% credibility
Found May 04, 2026 at 12 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Kotlin
AI Summary

An open-source Android library providing detailed telemetry on device integrity to detect tampering, rooting, emulators, and cloning for backend analysis.

How It Works

1
🔍 Discover a smart protector

You hear about a free tool that quietly checks if phones running your app are safe from cheats and hacks.

2
📱 Add it to your app

You simply include the protector in your app project so it can watch for trouble.

3
🔨 Build and update your app

You rebuild your app with the protector inside and share the new version with your users.

4
🛡️ Your app starts checking

As users open your app, it gently scans their phone for signs of tampering or fakes without slowing anything down.

5
📊 Get clear safety reports

You receive simple reports showing which devices look safe and which ones might need extra care.

Keep your app secure

With honest insights, you confidently protect honest players and spot any bad actors.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 12 to 12 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is DeviceIntelligence?

DeviceIntelligence is an open-source Android telemetry SDK in Kotlin that generates a deterministic JSON report on device integrity, covering APK tampering, hardware key attestation, bootloader status, root indicators, ART runtime hooks, emulators, and app cloners. It plugs into your app via JitPack, runs one-shot or periodic scans, and ships facts to your backend for policy decisions—no kill-switches or RASP bloat. Works on AOSP, GrapheneOS, and stock devices without Google Play Services.

Why is it gaining traction?

Unlike black-box Play Integrity or pricey commercial RASP, it's fully auditable open-source Android code with no vendor lock-in, catching real threats like Frida, LSPosed, Magisk, and DEX injection via 8-layer native checks. Developers dig the privacy-first design (anonymous client IDs, no PII) and backend-agnostic JSON that slots into BigQuery or custom fraud logic. As a github open source tool, it beats simple root checkers by exposing granular evidence for server-side gating.

Who should use this?

Android devs in fintech, gaming, or high-value open-source Android apps fighting fraud—think banking apps blocking rooted logins or open source android games spotting emulators. Ideal for teams ditching Play Services dependency or auditing detections in self-hosted setups, especially on custom ROMs like CalyxOS.

Verdict

Promising for open source Android security but early at 12 stars and 1.0% credibility—docs shine with samples and validation runbooks, yet low adoption signals unproven fleet scale. Try the minimal sample if you need tamper telemetry now; watch for more battle-testing before production.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.