Awards
Solves
| Challenge | Category | Value | Time |
| Backdoor5 | Miscellaneous | 100 | |
| Backdoor4 | Miscellaneous | 100 | |
| Backdoor3 | Miscellaneous | 100 | |
| Backdoor2 | Miscellaneous | 100 | |
| Backdoor1 | Miscellaneous | 100 | |
| Backdoor6 | Miscellaneous | 100 | |
| RPATH | Binary Protection | 100 | |
| Hardcoded Secret | Binary Protection | 100 | |
| File System Expose | Content Providers | 100 | |
| SQL Injection | Content Providers | 100 | |
| Clipboard | Insecure Data Storage | 100 | |
| Memory | Insecure Data Storage | 100 | |
| External Storage | Insecure Data Storage | 100 | |
| Internal Storage | Insecure Data Storage | 100 | |
| Shared Preferences | Insecure Data Storage | 100 | |
| SQLite Databases (Unencrypted) | Insecure Data Storage | 100 | |
| WTF Logs | Logs | 100 | |
| Verbose Logs | Logs | 100 | |
| Debug Logs | Logs | 100 | |
| Warnings Logs | Logs | 100 | |
| Error Logs | Logs | 100 | |
| Informational Logs | Logs | 100 | |
| Sanity Check Flag | Sanity Check | 0 |