Skip to content

Azure DevOps

Azure Extension for Ostorlab Mobile security & privacy scanner.

This extension/plugin adds the ability to perform automatic mobile app security testing for Android and iOS mobile apps through the Ostorlab SaaS platform.


Ostorlab scans mobile applications (Android APK, AAB, iOS IPA) for security and privacy issues. It provides full coverage by detecting issues on both the client-side and service-side, covering both the application code and all of its dependencies.

Ostorlab supports all major frameworks, both native and multi-platform. This includes Java, Kotlin, Objective C, Swift, Flutter, Cordova, React Native, Ionic and Xamarin.

Ostorlab provides both static and dynamic analysis capabilities, detecting over 500 vulnerability classes, like hardcoded secrets, privacy data leakage, untrusted input inject, outdated dependencies with a database of over 120k known vulnerable dependency.

Requires a subscriptions.

Job Parameters

Following are parameters needed for the job:

Required environment variables

  • API_KEY - Specifies your API key
  • FILE_PATH - Specifies the path to the Android APK file or the iOS IPA file
  • PLATFORM - Specifies the platform. Possible values: android or `ios

Optional environment variables

  • OSTORLAB_SCAN_PROFILE - Select the scan profile to run. You can choose between Fast Scan for rapid static analysis or Full Scan for full Static, Dynamic and Backend analysis.
  • OSTORLAB_TITLE - Specifies the scan title
  • OSTORLAB_WAIT_FOR_RESULTS - Set to true if you want to wait for the scan to finish and retrieve the result
  • OSTORLAB_WAIT_MINUTES - Specifies the number of minutes to wait. Default value: 30
  • OSTORLAB_BREAK_BUILD_ON_SCORE - Set to true to generate an exception if the scan risk rating is higher than the threshold
  • OSTORLAB_RISK_THRESHOLD - Specifies your risk rating threshold. Possible values: LOW

API key

  1. Go to the API keys menu
  2. Click the new button to generate a new key
  3. Copy the API key (You can add a name and an expiry date to your key)
  4. Click the save button to save your key


Find it in Azure Devops Marketplace

Then install it as follows:

Build Configuration

Basic Config

Advanced Config

Extra parameter

The extra parameter allows you to supply your SBOM/Lock files for an enhanced scan analysis and/or to supply either simple credentials (login-password) or custom credentials (name-value) to enable authenticated testing. The extra parameter can be either in the following syntax.

Here you can see the list of the supported files: - buildscript-gradle.lockfile - Cargo.lock - composer.lock - conan.lock - Gemfile.lock - go.mod - gradle.lockfile - mix.lock - Pipfile.lock - package-lock.json - packages.lock.json - pnpm-lock.yaml - poetry.lock - pom.xml - pubspec.lock - requirements.txt - yarn.lock

Sample Build Pipeline for Android

  vmImage: 'macos-latest'

- task: Gradle@2
    workingDirectory: ''
    gradleWrapperFile: 'gradlew'
    gradleOptions: '-Xmx3072m'
    publishJUnitResults: false
    testResultsFiles: '**/TEST-*.xml'
    tasks: 'assembleDebug'
- task: CopyFiles@2
    contents: '**/*.apk'
    targetFolder: '$(build.artifactStagingDirectory)'
- task: PublishBuildArtifacts@1
    pathToPublish: '$(build.artifactStagingDirectory)'
    artifactName: 'drop'
    artifactType: 'container'
- task: ostorlab-azure-security-scanner@1
    apiKey: 'I7mdo4lz.XXXXXXXXXX'
    filepath: '/dev/myApp.apk'
    platform: 'android'
    artifactsDir: '$(build.artifactStagingDirectory)/ostorlabArtifacts'
    extra: |
              - "package-lock.json"
              - "gradle.lockfile"
              - {"login": "", "pass": "pass1"}

Note: "task: ostorlab-azure-security-scanner@1" is the main task for security analysis. The other tasks above are used to generate the Android apk file.