1 Static Analysis of The DeepSeek Android App
Adam Roussel edited this page 2025-02-12 19:32:33 +00:00


I performed a fixed analysis of DeepSeek, securityholes.science a Chinese LLM chatbot, utilizing variation 1.8.0 from the Google Play Store. The objective was to determine potential security and personal privacy issues.

I have actually composed about DeepSeek previously here.

Additional security and personal privacy issues about DeepSeek have been raised.

See likewise this analysis by NowSecure of the iPhone variation of DeepSeek

The findings detailed in this report are based simply on fixed analysis. This means that while the code exists within the app, there is no definitive proof that all of it is carried out in practice. Nonetheless, the existence of such code warrants scrutiny, particularly offered the growing concerns around data personal privacy, security, the prospective misuse of AI-driven applications, and cyber-espionage characteristics in between global powers.

Key Findings

Suspicious Data Handling & Exfiltration

- Hardcoded URLs direct information to external servers, raising issues about user activity monitoring, such as to ByteDance "volce.com" endpoints. NowSecure determines these in the iPhone app the other day too. - Bespoke file encryption and data obfuscation approaches exist, with signs that they could be used to exfiltrate user details.