How to deobfuscate an Android stacktrace using mapping file

We can use pro-guard tool to retrace :

1st get the mapping file from the below location

<project-path>app/build/outputs/mapping/flavor/release/mapping.txt

Find the pro-guard tool i.e. "proguardgui" from the below location

<your-computer-name>/AppData/Local/Android/SDK/tools/proguard/lib

then you will get proguardgui.jar

On mac : /Users/<your computer name>/Library/Android/sdk/tools/proguard/lib

By using terminal

java -jar /Users/<your computer name>/Library/Android/sdk/tools/proguard/lib/proguardgui.jar

proguardgui tool

Now click on the retrace option on the left menu side to get the below window, browse your mapping.txt file from the above location and add your stack trace error logs in the obfuscated stack trace window and then click on the ReTrace button to get the deObfuscated error report.

There is one more way of doing automatically using Google play store console.

Check this website of Google Play Store Console for detailed steps.


Get deobfuscated crash stacktrace from your app page

Upload your mapping.txt to your app PlayStore page with the following steps:

  1. Sign in to your Play Console.
  2. Select an app.
  3. On the left menu, click Android vitals > Deobfuscation files.
  4. Next to a version of your app, click Upload.
  5. Upload the ProGuard mapping file for the version of your app.

After doing so, to view your deobfuscated crash stack traces:

  1. Sign in to your Play Console.
  2. Select an app.
  3. On the left menu, click Android vitals > ANRs & Crashes.
  4. Select a crash.
  5. On the "Stack Traces" tab, you'll see your deobfuscated stack traces.

You can check this link for more details.

Deobfuscate a piece of stacktrace

To convert the code by yourself use the retrace script (retrace.bat on Windows; retrace.sh on Mac/Linux). It is located in the ~/Android/sdk/tools/proguard/bin/ directory. The script takes the mapping.txt file and your stack trace, producing a new, readable stack trace. The syntax for using the retrace tool is:

retrace.bat|retrace.sh [-verbose] mapping.txt [<stacktrace_file>]