I currently work on xamarin forms app for bank. As part of penetration testing(done by external company) we currently have an issue for ios app that I was not able to fix or find some information that would help me.
The original message of the issue:
"Three weakly linked DYLib libraries were observed in the IOS compiled executable, one of these is
the core systems library which is a common target for IOS attackers, the replacement of this library
by a malicious version would affect all functions in the application which interact with IOS core
services."
This is the linked libraries:
I am not sure what tool they use, but It can be shown using xcode's commandline tool 'otool' with -L command and path to appName.iOS file within packed .ipa file
As a recommendation they gave us only this:
Core libraries must be strongly linked or using the @RPATH constant.
I tried to play with linker options, but with no luck. Also @RPATH was a dead end for me.
Any help or hint how to change this is very appreciated.