Runtime WebView bridge enumeration & UA-surface inspection from a Web browser context.
Android WebView JSI Inspector (Beta) Version 1.0
Runtime WebView bridge enumeration & UA-surface inspection from a Web browser context.
This tool loads as a normal web page inside a target Android WebView and then:
window against a clean iframe baselineThis release is intentionally page-context only.
It does not:
Instead it reports the effective runtime surface exposed to the loaded page.
Static analysis often misses bridge exposure that depends on runtime flow, conditional injection, app build variants, or navigation context.
This tool is designed for cases where you can influence or control the URL loaded into a WebView and want a lightweight way to inspect:
Get a target Android app to load this page in its WebView.
Let the page scan the runtime environment.
Review:
Export the JSON results.
The scanner performs passive structural analysis of the JavaScript environment and does not invoke any functions.
The tool creates a clean <iframe> and collects its window keys, then compares them against the active page:
windowwindowobserved - baselineThis isolates environment-specific globals, including potential bridge objects.
Each candidate is analyzed without execution:
typeofEach candidate is evaluated using four signals:
Objects exposing multiple callable functions are more likely to be bridges.
Constructors not matching known browser/DOM types are flagged.
Regex patterns detect common bridge naming:
android, bridge, webview, native, handler, api, etc.Values that are not typical object or function types are flagged.
Each signal contributes +1:
Score interpretation:
This tool answers:
“What is actually exposed to this page at runtime?”
This is important because bridge exposure may be:
This is a heuristic system, not a proof of exploitation.
Some framework or app globals may appear bridge-like.
Bridges may evade detection if:
The tool cannot determine:
setUserAgentString() was usedIt only observes the effective runtime environment.
This is a beta release intended for research, defensive security testing & WebView analysis workflows.
Known characteristics:
index.html - self-contained scanner pageLICENSE - MIT licenseMIT