I need an Android security specialist who can build a robust, native-layer root-detection module that reliably flags even the most recent Magisk tricks. The core logic must be written in C++ using the NDK, then surfaced to the app through a clean JNI bridge. Scope • Detect Magisk Hide, DenyList bypass, and Zygisk, even when the user tries to camouflage them. • Embed the most sensitive checks in C/C++ so they are harder to trace, patch, or repackage. • Provide lightweight Kotlin/Java wrappers only where absolutely necessary. Deliverables 1. Full source code (C/C++ plus any minimal Java/Kotlin glue). 2. Clear developer documentation that explains every detection technique and how to extend it. 3. A concise test report showing results on both rooted and non-rooted devices, with step-by-step reproduction notes. Acceptance • The demo APK must crash or show a blocked state on devices running Magisk (Hide, DenyList bypass, or Zygisk). • The same APK must run normally on an untouched, non-rooted device. • All code should compile with the latest stable Android NDK and be lint-clean. If you have previous work that showcases deep Magisk, SELinux, or kernel-level checks, let me know. I’m ready to start as soon as the technical approach is confirmed.