 
                            ...
Deploying a Java application with the JVMTI, JPDA, or remote monitoring enabled can allow an attacker to monitor or modify its behavior.
| Rule | Severity | Likelihood | 
|---|
| Detectable | Repairable | Priority | Level | 
|---|---|---|---|
| ENV05-J | High | Probable | No | 
| No | 
| P6 | 
| L2 | 
Automated Detection
This rule is not amenable to automated static analysis.
...
JVMTI is not supported on the Dalvik VM.
Bibliography
| [JMX 2006] | 
| Section 2.6, "The JVM Tool Interface" | |
...
...