Note: The API automatically detects fake, renamed, or
tampered certificates. When detected, additional fields are added to
the response.
{ "success":
true, "data": {
"certificate": {
"certificate_info": {
"subject": {
"commonName":
"iPhone Distribution: Company Name",
"organizationName":
"Company Name Ltd"
},
"serial_number":
"1234567890..."
},
"type":
"Enterprise Certificate",
"fake_detection": {
"is_fake": true,
"confidence":
"high", "reason":
"Certificate authenticity verification failed."
},
"WARNING":
"⚠️ FAKE/RENAMED CERTIFICATE DETECTED",
"fake_alert": {
"is_fake": true,
"message":
"This certificate failed our verifications.", "recommendation":
"Do NOT use this certificate. It has been tampered with or is not
from a legitimate source."
} },
"cached": false
},
"message":
"Certificate processed successfully" }
Important: Fake certificates will NOT trigger
Telegram notifications to prevent spam. The detection uses proprietary
verification methods to ensure accuracy.
OCSP Status Check - Verify certificate revocation
status
Entitlements Parsing - Extract and analyze
provisioning profile entitlements
Dual File Support - Compare P12 and mobileprovision
files with automatic fallback
Caching - Automatic caching for faster repeated
requests
Rate Limiting - Fair usage limits (30 req/min)
🔍 Fake Certificate Detection
Our API includes advanced detection to identify fake, renamed, or
tampered iOS certificates. This feature protects you from using
compromised certificates that could lead to app revocation or security
issues.
What We Detect
Renamed Certificates - Certificates that have been
modified to show different organization names
Tampered Certificates - Certificates with modified
metadata that don't match Apple's standards
Forged Certificates - Certificates that fail
cryptographic authenticity verification
Detection Response Fields
When a fake certificate is detected, the following fields are added to
the response:
Field
Type
Description
fake_detection.is_fake
Boolean
Whether the certificate is detected as fake
fake_detection.confidence
String
Confidence level: "high", "medium", or "low"
fake_detection.reason
String
Generic description of why it failed verification
WARNING
String
Warning message if fake detected
fake_alert.message
String
Detailed alert message
fake_alert.recommendation
String
Recommended action to take
Privacy: Our detection methods are proprietary and
not disclosed to prevent circumvention. We use advanced cryptographic
verification that goes beyond standard certificate validation.
Fake Certificate Behavior
Fake certificates will NOT trigger Telegram
notifications (spam prevention)
Detection results are cached in the database for analytics
The API still returns a successful response (HTTP 200) with warning
flags
All standard certificate information is still included in the
response
💡 Use Cases
Automated certificate validation in CI/CD pipelines
Building certificate management tools
Monitoring certificate expiration dates
Validating certificates before signing apps
Creating certificate inventory systems
Screening certificates for authenticity before use