How iOS Apps Are Leaking Secrets and Endangering User Privacy
In March 2025, The mobile world is buzzing after recent research uncovered a shocking truth about iOS apps: many are riddled with secret leaks, and the coding practices behind them are far from secure. With over a billion iPhones in use worldwide, these revelations raise serious concerns about the safety of personal data and the standards upheld by developers.
The Research That Shocked the App World
The researchers analyzed over 156,000 iOS applications, approximately 8% of the Apple App Store’s offerings. The results were staggering, more than 71% of these apps contained at least one hardcoded secret, averaging 5.2 secrets per app. In total, over 815,000 hardcoded secrets were identified, encompassing API keys, cloud storage credentials, and payment processor information.
The research highlights two key issues:
- Widespread Secret Leaks – Many apps are unintentionally leaking sensitive information, including authentication tokens, passwords, and private keys, through insecure channels. These leaks often go unnoticed by developers but are a goldmine for hackers.
- Poor Coding Practices – The research team found that many iOS apps were plagued by poor coding practices, including improper encryption, hard-coded secrets, and insecure data storage. These vulnerabilities leave users exposed to risks such as data breaches, account hijacking, and even identity theft.
Understanding Hardcoded Secrets
Hardcoded secrets refer to sensitive data embedded directly within an application’s source code. This practice is risky because, despite the compiled nature of iOS applications, determined attackers can decompile the apps to retrieve these secrets. Once obtained, these credentials can grant unauthorized access to various services, potentially leading to data breaches, unauthorized transactions, and compromised user privacy.
Commonly Exposed Secrets
The study highlighted several frequently exposed types of sensitive information:
Payment Processor Keys – Hundreds of sensitive keys related to payment processors were discovered, which could be exploited to initiate unauthorized payments or refunds.
Cloud Storage Endpoint – Approximately 83,000 hardcoded cloud storage endpoints were found, with 836 lacking authentication measures, thereby exposing around 406TB of data.
Firebase Database URLs – Over 51,000 Firebase endpoints were identified, many of which were accessible without proper authentication, posing risks of unauthorized data access.
API Keys for Third-Party Services – Thousands of keys for services such as Fabric API, Live Branch, and MobApp Creator were exposed, potentially allowing attackers to manipulate app functionalities or access sensitive user data.

How Could This Happen in 2025?
In a world where digital privacy is increasingly prioritized, how can such sloppy coding practices still be so prevalent? Part of the problem lies in the rush to market. With tight deadlines and high consumer demand, developers often cut corners, overlooking important security checks.
Some apps use outdated libraries, while others rely on open-source code without fully understanding its security implications. Worse, certain app developers might prioritize features and user experience over security, assuming Apple’s robust iOS framework will act as a fail-safe. Unfortunately, that assumption can be dangerously wrong.
Potential Consequences
The implications of this discovery are far-reaching. If you’ve ever used an app to manage your bank accounts, shop online, or even control smart home devices, your sensitive data could be at risk. The leaked secrets could allow cybercriminals to:
- Unauthorized Data Access – Attackers can retrieve personal user information, leading to privacy violations and potential identity theft.
- Financial Fraud – Exposed payment processor keys can be misused to conduct unauthorized transactions, resulting in financial losses for users and businesses alike.
- Reputation Damage – Companies found to have such vulnerabilities may suffer reputational harm, leading to decreased user trust and potential loss of business.
- Regulatory Penalties – Non-compliance with data protection regulations due to such exposures can result in hefty fines and legal repercussions.
- Hijack Accounts – Attackers could use leaked API keys or tokens to access user accounts without their knowledge.
Recommendations
While users are encouraged to protect themselves by keeping apps up to date and being cautious with the permissions they grant, much of the onus falls on developers. To safeguard applications and their users, developers should adopt the following best practices:
- Secure Coding Practices – Developers must prioritize security in the coding process, ensuring encryption is applied correctly and sensitive data is never hard-coded or exposed in plaintext.
- Perform Code Audits and Penetration Testing – Regular audits and testing can reveal hidden vulnerabilities before they reach the hands of the public, allowing developers to fix potential problems before they are exploited.
- Implement Secure Authentication Mechanisms – Ensure that all endpoints, especially those related to cloud storage and databases, are protected with robust authentication and authorization protocols.
- Keep Libraries Updated – Many vulnerabilities arise from using outdated libraries or open-source code that has not been properly vetted. Developers must ensure that third-party code is up to date and secure.
Conclusion
This research serves as a stark reminder of the fragility of our digital ecosystem. As mobile users, we put our trust in developers and companies to secure our data, but this trust is easily shattered by weak security measures and poor coding practices. For developers, it’s time to step up. Building secure apps is not just a best practice, it’s a responsibility.