Pgyer document center

Application Security

In order to provide users with a safe and reliable usage environment, your application must not contain any security risks that attempt to abuse or improperly use any network, device, or interfere with other applications.

  1. The application must not contain bugs (including download failures, inability to install or register, inability to exit, severe lag, etc.).
  2. The application must not contain content that disrupts game balance by modifying game features (such as game crackers and modifiers).
  3. The application shall not have any unexplained hidden features or content behaviors that contradict the description.
  4. The application must not contain viruses or Trojans, including but not limited to causing negative impacts on the system or infringing on user rights through suspicious code, files, and programs.
  5. Applications shall not, without the user's knowledge or authorization, subscribe to various paid services (such as sending paid SMS, dialing paid phone numbers, luring users to subscribe and purchase content) or use mobile terminals for payment through covert execution, deceiving users to click, etc., resulting in economic losses for users.
  6. The application shall not engage in malicious activities such as hijacking system operations, exploiting vulnerabilities, or using deceptive means to monitor users or steal data, including but not limited to desktop hijacking, monitoring clippings, setting phishing links to steal user accounts, or other sensitive information.
  7. The application shall not allow remote attackers to control mobile phones, receive remote control instructions issued by attackers, infringe on user privacy, steal user assets, or perform other malicious behaviors without authorization or knowledge.
  8. Applications shall not download, install, or run third-party malicious code to modify the functionality of the application or other applications, including but not limited to abusing hot updates or plugin technology to dynamically load malicious code.
  9. The application shall not, without the user's knowledge or authorization, automatically make phone calls, send SMS, MMS, emails, frequently connect to the network, or cause user tariff losses.
  10. Applications shall not use systems and resources for denial of service attacks (DoS), or as part of distributed denial of service attacks (DDoS), prevent users from accessing services.
  11. The application shall not interfere, block, block, or access the user's communication functions, network services, or other legitimate businesses in an unauthorized manner, causing the user's phone to be unable to be used normally and damaging the user's interests.
  12. The application shall not induce or deceive users, and shall perform operations that are detrimental to the security of the system and application without the user's subjective understanding of the consequences of the operation, including but not limited to downloading or installing system root tools, activating device manager options, enabling auxiliary functions, etc.
  13. Applications shall not encrypt user data, block windows, abuse lock screen, lock applications, or exploit denial of service vulnerabilities to affect the normal use of the phone by users, and extort users on the grounds of restoring normal use.
  14. Applications must not forcibly start system services (such as Bluetooth, GPS, etc.) without user authorization.
  15. Applications shall not prompt or force device restarts, nor induce or force changes to system settings on user devices beyond the scope of the application, including but not limited to automatically modifying system default configurations after installation without informing the user, etc