The STK technology has limited independent development support available.<ref name="autogenerated4" />
==Security==
SiceSince an STK runs applications, its security depends on the secuirtysecurity of the applications deployed. In SepetmberSeptember 2019 it was reported that an unnamed company was executing attacks on STK. To execute the attack, an SMS containing a specific type of spyware-like code washas to be sentsend to the victim's number. This message instructedinstructs the STK to retrieve the Cell-ID and send the result as a SMS message to a phone number controlled by attacker.<ref>[https://simjacker.com/ New Simjacker vulnerability exploited by surveillance companies for espionage operation]</ref>