Unpack the APK (apktool d {APK name})

Map files

If you are able to find a file called index.android.bundle.map, you will be able to analyse the source code in an unminified format. map files contain the source mapping that allows you to map minified identifiers. If the React Native application you are reversing has the map file included within the assets folder, you can take advantage of this by creating a file named index.html in the same directory with the following within it:

<script src="index.android.bundle"></script>

Save this file and then open it in Google Chrome. Open up the Developer Toolbar (Command+Option+J for OS X or Control+Shift+J for Windows), and click on “Sources”. You should see a neatly mapped out JavaScript file, split up into folders and files that make up the main bundle

If this doesn't work you can try and decompile the JS using:

https://github.com/richardfuca/react-native-decompiler

Search for Sensitive information

A pattern that is popular with React Native applications, is the use of a third party database such as Firebase. In the past, there have been a number of applications found to be improperly using Firebase’s authentication model and including an API key that is too permissive, within their React Native application.

The following strings can be grepped for in order to extract the Firebase API key from the index.android.bundle:

FIREBASE_API_KEY
FIREBASE_AUTH_DOMAIN
FIREBASE_DB_URL
FIREBASE_BUCKET
apiKey

For example:

grep -rnis 'apiKey' index.android.bundle

Source:

https://blog.assetnote.io/bug-bounty/2020/02/01/expanding-attack-surface-react-native/