DeviceTrustReport class

Device trust report containing security signals from the native platform.

This model aggregates heuristic detection results for compromised devices:

  • Root/jailbreak detection
  • Emulator/simulator detection
  • Hook/Frida framework detection
  • Debugger attachment detection
  • Developer mode and ADB status (Android only)

All boolean flags default to false if the native layer fails or times out (fail-soft behavior).

Constructors

DeviceTrustReport({required bool rootedOrJailbroken, required bool emulator, required bool devModeEnabled, required bool adbEnabled, required bool fridaSuspected, required bool debuggerAttached, required Map<String, dynamic> details})
Creates a DeviceTrustReport with the given fields.
const
DeviceTrustReport.fromMap(Map<String, Object?> map)
Constructs a DeviceTrustReport from a raw map returned by the platform.
factory

Properties

adbEnabled bool
ADB debugging is enabled (Android only; always false on iOS).
final
debuggerAttached bool
Debugger is attached to the current process.
final
details Map<String, dynamic>
Platform-specific signals and metadata (e.g., detected paths, libraries).
final
devModeEnabled bool
Developer mode is enabled (Android only; always false on iOS).
final
emulator bool
Running on an emulator (Android) or simulator (iOS).
final
fridaSuspected bool
Frida or other hooking framework is suspected.
final
hashCode int
The hash code for this object.
no setterinherited
rootedOrJailbroken bool
Device is rooted (Android) or jailbroken (iOS).
final
runtimeType Type
A representation of the runtime type of the object.
no setterinherited

Methods

noSuchMethod(Invocation invocation) → dynamic
Invoked when a nonexistent method or property is accessed.
inherited
toMap() Map<String, Object?>
Converts this report to a raw map for serialization.
toString() String
Returns a concise string representation of the main flags.
override

Operators

operator ==(Object other) bool
The equality operator.
inherited