...
Deploying a Java application with the JVMTI, JPDA, or remote monitoring enabled can allow an attacker to monitor or modify its behavior.
Rule | Severity | Likelihood |
|---|
Detectable | Repairable | Priority | Level |
|---|---|---|---|
ENV05-J | High | Probable | No |
No |
P6 |
L2 |
Automated Detection
This rule is not amenable to automated static analysis.
...
JVMTI is not supported on the Dalvik VM.
Bibliography
[JMX 2006] |
Section 2.6, "The JVM Tool Interface" | |
...
...