Mantle Verify is a compact diagnostics app that shows exactly what a normal Android app can read from your device — and, when Mantle/LSPosed hooks are active, it reflects the spoofed (“virtual”) values in real time.
No magic, no bypassing anything. Just a clear report of what apps can actually see.
🧭 Location & Timezone
• Shows last known GPS fix (latitude/longitude)
• Reverse-geocoded address (city, state, country where available)
• Timezone ID + UTC offset (e.g. Asia/Kolkata, UTC+05:30)
• Helpful for checking if location and timezone spoofing are consistent
🔐 Security status
• Bootloader state signals (locked, unlocked, tampered)
• Developer options on/off
• Quick high-level view: is this device likely “stock” or modified?
📱 Device & OS info
• Model, manufacturer and build fingerprint
• Android version + SDK level
• Good for sanity-checking what apps see versus what the phone actually is
📶 Network, SIM & radio
• SIM operator name
• SIM ICCID* (SIM serial)
• IMSI* (subscriber ID)
• MCC/MNC (mobile country + network code)
(*Values may be restricted on newer Android versions for third-party apps.)
📡 Wi-Fi & Bluetooth
• Wi-Fi SSID (network name)
• Wi-Fi MAC address*
• Bluetooth MAC address*
(*Often randomized or restricted; Mantle hooks can override what apps see.)
🧾 Google / ID signals
• Android ID (Secure ANDROID_ID)
• Advertising ID*
• Google Services Framework (GSF android_id), when available
• Primary Gmail account (masked to what a normal app can read)
(*Availability depends on Google Play Services and device settings.)
🎞 DRM / Media ID
• Widevine DRM deviceUniqueId, when available
• If Mantle’s MediaDrm hook is active, you’ll see the spoofed value here
• For advanced users checking playback / DRM fingerprint differences
📞 Phone number
• Line1 phone number, when the carrier exposes it
• Helpful to see if apps can read your SIM line number or not
🧪 Environment / root detector
• Heuristic checks for:
– Root manager apps (Magisk, KernelSU, APatch, etc.)
– Xposed / LSPosed managers and modules
– su binaries and BusyBox in common paths
– RW system/vendor mounts
– Dangerous system properties (ro.debuggable, ro.secure, vbmeta state)
– Magisk traces and modules folder
– Signature spoofing permissions
– Custom recovery traces and SELinux permissive state
• Green = this check looks clean
• Red = something suspicious was found
(Detection is heuristic only; a clever root hider can still bypass these checks.)
🧪 Designed as a companion to Mantle
When you enable Mantle / LSPosed hooks for the Mantle Verify package, this app lets you see the virtualized (“fake”) values that target apps would see:
• Spoofed Android ID, IMEIs, serial, MAC addresses, SIM data, etc.
• Spoofed DRM deviceUniqueId
• Spoofed IDs are reflected directly in the report and cards
📤 Exportable device report
• One-tap “Export all” summary of everything shown on screen
• Great for debugging setups, filing bug reports or comparing real vs spoofed
• Shares as plain text so you can paste in chats, email, or notes apps
⚙️ Simple, clean UI
• Three tabs: Home, Detector, About
• Dark / light / system theme toggle
• Icon-only “Copy” and “Export” actions on each card
• Optimized spacing so everything fits nicely above the bottom bar
📋 Notes & limitations
• No root required for basic reading (device info, Android ID, network, etc.).
• Some identifiers (IMEI, serial, IMSI, ICCID, Wi-Fi/Bluetooth MAC) are restricted on newer Android versions — in those cases Mantle Verify shows that they’re unavailable, just like a regular third-party app would see.
• Network may be used for analytics and ads as disclosed in the Data Safety section.
Mantle Verify is built for privacy-conscious users, power users and developers who want a transparent view of device signals — and a simple way to prove when spoofed IDs are actually active. Use results as guidance only, not a guarantee ok