flutter_tamper_detector 0.0.2
flutter_tamper_detector: ^0.0.2 copied to clipboard
flutter_tamper_detector is a Flutter security plugin that detects rooting, hooking tools like Frida and Xposed, or emulators, allowing you to block execution or exit the app.
example/lib/main.dart
import 'package:flutter/material.dart';
import 'package:flutter_tamper_detector/flutter_tamper_detector.dart';
void main() {
runApp(MyApp());
}
class MyApp extends StatefulWidget {
const MyApp({super.key});
@override
// ignore: library_private_types_in_public_api
_MyAppState createState() => _MyAppState();
}
class _MyAppState extends State<MyApp> {
bool isEmulator = false;
bool isRooted = false;
bool isHooked = false;
@override
void initState() {
super.initState();
_checkDeviceStatus();
}
// Função para checar o status do dispositivo usando seu package
void _checkDeviceStatus() async {
bool emulator = await FlutterTamperDetector.isEmulator();
bool rooted = await FlutterTamperDetector.isRooted();
bool hooked = await FlutterTamperDetector.isHooked();
setState(() {
isEmulator = emulator;
isRooted = rooted;
isHooked = hooked;
});
}
@override
Widget build(BuildContext context) {
return MaterialApp(
debugShowCheckedModeBanner: false,
home: Scaffold(
appBar: AppBar(title: Text('Flutter Tamper Detector Example')),
body: Padding(
padding: const EdgeInsets.all(16.0),
child: Column(
crossAxisAlignment: CrossAxisAlignment.start,
children: <Widget>[
Text('Is Emulator: $isEmulator'),
Text('Is Rooted: $isRooted'),
Text('Is Hooked: $isHooked'),
],
),
),
),
);
}
}