Security Overview
What's actually dangerous, what isn't, and how to scan with confidence.
A few edge cases do blur this line:
WIFI:, tel:, sms: — can trigger system actions with little or no confirmation.The risk from scanning alone is low but not zero — it depends heavily on how automated your scanning software is.