CI/CD Business Security Compliance Detection: Challenges, Improvements, and Benefits

This article outlines the background, current challenges, and recent enhancements of CI/CD‑integrated business security compliance detection for mobile apps, including incremental source‑code scanning, call‑graph analysis, and performance gains, while also discussing future directions and benefits.

ByteDance Terminal Technology
ByteDance Terminal Technology
ByteDance Terminal Technology
CI/CD Business Security Compliance Detection: Challenges, Improvements, and Benefits

Background: With rapid internet development and stricter privacy regulations worldwide, mobile applications face increasing risks of privacy and compliance issues after release.

Technical background: Business security checks are integrated into CI (Continuous Integration) and CD (Continuous Delivery) stages, blocking code merges or releases when risks are detected.

Current status and challenges: Existing CI checks on compiled intermediate artifacts (using Gradle transform and ASM) cannot cover source code, making license compliance difficult; locating issues is costly due to loss of original source information; CD artifact scans based on smali files miss indirect call chains.

Improvements: Implemented CI incremental source code detection by extracting changed files via git diff, handling component paths precisely, and scanning added/updated source for security rules; introduced BDAnalysis engine to build call graphs from Dex, enabling full call‑chain analysis and reducing Android artifact scan time from ~175 s to ~33 s.

Benefits: The new approach covers both Android and iOS source code, provides automatic precise issue localization and aggregation, improves detection efficiency, and lowers scanning latency while supporting license compliance and open‑source security checks.

Future work: Build metrics for detection effectiveness, integrate CI/CD data, enhance BDAnalysis for more scenarios, and continue to protect ByteDance’s mobile products.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

iOSci/cdAndroidOperationssecurity compliance
ByteDance Terminal Technology
Written by

ByteDance Terminal Technology

Official account of ByteDance Terminal Technology, sharing technical insights and team updates.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.