正如在香港OEM峰会上所传达的那样,谷歌将要求合作伙伴从2019年2月4日开始上传所有2019-03-01 SPL或更高版本的版本的STS结果。合作伙伴不需要通过STS,而只需上传STS运行的结果及其构建提交。


OEM应遵循安全测试套件中的STS / CTS配置指南。如果不这样做可能会导致STS不稳定或测试失败不准确。

As communicated at the Hong Kong OEM summit, Google will be requiring that partners upload STS results starting February 4, 2019 for all builds asserting a 2019-03-01 SPL or higher. Partners are not required to pass STS, but only to upload the results of the STS run with their build submission.


    • Partners must run STS in user-debug or eng mode to ensure that all tests are executed as explained STS Enforcement.
  • Partners who encounter test failures or other STS issues must raise a bug and assign it to
  • OEMs should follow the STS/CTS configuration guidelines located Security Test Suite.  Failure to do so may cause STS instability or inaccurate test failures.

If you run into issues with either STS framework or STS test failures, please read our FAQ page.


We are following up on our intention to increase enforcement for devices that have pre-installed apps that modify sensitive security settings, such as Google Play Protect (GPP) and enable Unknown Sources.

In addition, to help guide your remediation efforts, we have identified the following builds submitted to Google AFPE between 1-18 January, that include the prohibited behavior。

We are requesting that does the following:
a. List all original sources for the impacted packages (please list all upstream authors of the listed packages that you are aware of) using the attached spreadsheet, tab 'Packages'.
b. Generating an OTA patch to remove GPP Disabling.
c. If you are generating a new, patched build, please submit them to Google APFE and provide a mapping of the old Fingerprint name to the new name in the attached spreadsheet, tab 'Fingerprints'.
d. If you are pushing the patched APK over the air without pushing the entire build, we recommend that you still upload a new build to AFPE as an SMR in order to validate that it is free from the prohibited behavior.




邮箱地址不会被公开。 必填项已用*标注