freerasp 2.0.0 icon indicating copy to clipboard operation
freerasp: ^2.0.0 copied to clipboard

freeRASP is a part of security SDK for the app shielding and security monitoring. Learn more about provided features on the freeRASP's homepage first.

freeRASP for Flutter #

freeRASP for Flutter is a part of security SDK for the app shielding and security monitoring. Learn more about provided features on the freeRASP's main repository first.

Usage #

We will guide you step-by-step, but you can always check the expected result in example.

Step 1: Prepare Talsec library #

Add dependency to your pubspec.yaml file

  freerasp: 2.0.0

and then run: pub get

iOS setup #

After depending on plugin follow with these steps:

  1. Open terminal
  2. Navigate to your Flutter project
  3. Switch to ios folder
$ cd ios
  1. Run: pod install
$ pod install

Note: .symlinks folder should be now visible under your ios folder.

  1. Open .xcworkspace/.xcodeproject folder of Flutter project in xcode
  2. Go to Product > Scheme > Edit Scheme... > Build (dropdown arrow) > Pre-actions
  3. Hit + and then New Run Script Action
  4. Set Provide build setting from to Runner
  5. Use the following code to automatically use an appropriate Talsec version for a release or debug (dev) build (see an explanation here):
cd "${SRCROOT}/.symlinks/plugins/freerasp/ios"
if [ "${CONFIGURATION}" = "Release" ]; then
    rm -rf ./TalsecRuntime.xcframework
    ln -s ./Release/TalsecRuntime.xcframework/ TalsecRuntime.xcframework
    rm -rf ./TalsecRuntime.xcframework
    ln -s ./Debug/TalsecRuntime.xcframework/ TalsecRuntime.xcframework
  1. Close the terminal window and then resolve warnings in the xcode project:

    1. Go to Show the Issue navigator
    2. Click twice on Update to recommended settings under Runner project issue > Perform changes
    3. Click twice on Update to recommended settings under Pods project issue > Perform changes

    Issues should be clear now.

Android setup #

  • From root of your project, go to android > app > build.gradle
  • In defaultConfig update minSdkVersion to at least 21 (Android 5.0) or higher
android {
defaultConfig {
    minSdkVersion 21

Dev vs. Release version #

Dev version is used during the development of application. It separates development and production data and disables some checks which won't be triggered during development process:

  • Emulator-usage (onEmulatorDetected)
  • Debugging (onDebuggerDetected)
  • Signing (onTamperDetected)

Which version of freeRASP is used is tied to development stage of application - more precisely, how application is compiled.

  • debug (assembleDebug) = dev version
  • release (assembleRelease) = release version

Step 2: Setup the Configuration for your App #

Make (convert or create a new one) your root widget (typically one in runApp(MyWidget())) and override its initState in State

void main() {
  runApp(const MyApp());

class MyApp extends StatefulWidget {
  const MyApp({Key? key}) : super(key: key);

  _MyAppState createState() => _MyAppState();

class _MyAppState extends State<MyApp> {
  void initState() {
    //TODO: freeRASP implementation

and then create a Talsec config and insert androidConfig and/or IOSConfig with highlighted identifiers: expectedPackageName and expectedSigningCertificateHash are needed for Android version.
expectedPackageName - package name of your app you chose when you created it
expectedSigningCertificateHash - hash of the certificate of the key which was used to sign the application. Hash which is passed here must be encoded in Base64 form Similarly, appBundleId and appTeamId are needed for iOS version of app. If you publish on the Google Play Store and/or Huawei AppGallery, you don't have to assign anything to supportedAlternativeStores as those are supported out of the box.

Lastly, pass a mail address to watcherMail to be able to get reports. Mail has a strict form which is passed as String.

  void initState() {

  Future<void> initSecurityState() async {

    TalsecConfig config = TalsecConfig(
      // For Android
      androidConfig: AndroidConfig(
        expectedPackageName: 'YOUR_PACKAGE_NAME',
        expectedSigningCertificateHash: 'HASH_OF_YOUR_APP',
        supportedAlternativeStores: [""],

      // For iOS
      iosConfig: IOSconfig(
        appBundleId: 'YOUR_APP_BUNDLE_ID',
        appTeamId: 'YOUR_APP_TEAM_ID',

      // Common email for Alerts and Reports
      watcherMail: '',

Step 3: Handle detected threats #

Create AndroidCallback and/or IOSCallback objects and provide VoidCallback function pointers to handle detected threats:

void initState(){
    // Talsec config
    // ...
    // Callback setup
    TalsecCallback callback = TalsecCallback(

      // For Android
      androidCallback: AndroidCallback(
          onRootDetected: () => print('Root detected'),
          onEmulatorDetected: () => print('Emulator detected'),
          onHookDetected: () => print('Hook detected'),
          onTamperDetected: () => print('Tamper detected'),
          onDeviceBinding: () => print('Device binding detected'),
          onUntrustedInstallationDetected: () => print('Untrusted installation detected'),

      // For iOS
      IOSCallback: IOScallback(
        onSignatureDetected: () => print('Signature detected'),
        onRuntimeManipulationDetected: () => print('Runtime manipulation detected'),
        onJailbreakDetected: () => print('Jailbreak detected'),
        onPasscodeChangeDetected: () => print('Passcode change detected'),
        onPasscodeDetected: () => print('Passcode detected'),
        onSimulatorDetected: () => print('Simulator detected'),
        onMissingSecureEnclaveDetected: () => print('Missing secure enclave detected'),
        onDeviceChangeDetected: () => print('Device change detected'),
        onDeviceIdDetected: () => print('Device ID detected'),

      // Common for both platforms
      onDebuggerDetected: () => print("Debugger detected"),

Step 4: Start the Talsec #

Start Talsec to detect threats just by adding these two lines below the created config and the callback handler:

void initState(){
  // Talsec config
  // ...
  // Talsec callback handler
  // ...
  TalsecApp app = TalsecApp(
        config: config,
        callback: callback,


And you're done 🎉!

Enterprise Services #

We provide extended services (ie. malware detection, detailed configurable threat reactions, immediate alerts and penetration testing) to our commercial customers with a self-hosted cloud platform as well. To get the most advanced protection compliant with PSD2 RT and eIDAS and support from our experts contact us at

TIP: You can try freeRASP and then upgrade easily to an enterprise service.

Plans Comparison #

freeRASP Premium Business Enterprise
Number of active devices unlimitted (monitoring up to 100k) up to 10 000k unlimitted unlimitted
Runtime App Self Protection (RASP, app shielding)
Advanced root/jailbreak protections basic standard advanced custom
Runtime reverse engineering controls
  • Debug
  • Emulator
  • Hooking protections
basic standard advanced custom
Runtime integrity controls
  • Tamper protection
  • Repackaging / Cloning protection
  • Device binding protection
basic standard advanced custom
Device OS security status check
  • HW security module control
  • Device lock control
  • Device lock change control
yes yes yes custom
UI protection
  • Overlay protection
  • Accessibility services protection
no yes yes custom
Hardening suite
Security hardening suite
  • Dynamic certificate pinning
  • Obfuscation
  • Secure storage hardening
  • Secure pinpad
no no yes yes
Attestation and API protection
Device attestation and dynamic API protection no no no yes
AppSec regular email reporting yes (up to 100k devices) yes yes yes
Data insights and auditing portal no yes yes yes
Embed code to integrate with portal no no yes yes
API data access no no yes yes
Data retention 1 month 1 month 1 year custom
Malware detection
SDK for Malware detection and backend monitoring no optional optional optional
User Safety suite
SDK API for Safety Dashboard for end-users min min yes yes
User Safety Assurance service (Improvement plan report, Top10 tips, hot attacks info) no no basic custom
Individual unique SDK build no yes yes yes
Private cloud cluster no no no custom
Native (iOS and Android) yes yes yes yes
Flutter (multiplatform) yes yes custom custom

Troubleshooting #

[Android] Cloud not find ... dependency issue #

Solution: Add dependency manually (see issue)
In android -> app -> build.gradle add these dependencies

dependencies {

 ... some other dependecies ...

   // Talsec Release
   releaseImplementation '*-release'

   // Talsec Debug
   debugImplementation '*-dev'

[iOS] Unable to build release for simulator in Xcode (errors) #

Solution: Simulator does not support release build of Flutter - more about it here. Use real device in order to build app in release mode.

pub points


verified publisher

freeRASP is a part of security SDK for the app shielding and security monitoring. Learn more about provided features on the freeRASP's homepage first.

Repository (GitHub)
View/report issues


API reference


Icon for licenses.MIT (LICENSE)




Packages that depend on freerasp