Prevent Malicious Misuse of ADB

Prevent Malicious Misuse of Android Debug Bridge (ADB)

For more info & fix link below:

ADB can be used maliciously in the following ways:

1.Extract or install apps on devices

2.Read and alter data while the app is running.

3.To attach to running processes, trace and modify application memory

4.Perform function or method hooking

5.Establish a remote shell (to run and execute commands remotely) on a device and inject code remotely

6.Change the application’s logic or control flows as it executes operations

7.Bypass existing security protections (for example, ADB can be used to disable tamper prevention or rooting detection, especially if such protections have been manually coded into the app’s source code and left unobfuscated).