The point is let say Bob extract your APK, he get the server URL and the names of the command. The command eg. "sql.LoginUser" does not provide the actual SQL command, as the actual command is stored at the server. If he is a registered user, of course he can execute the command and get back a result to let him access as his access. He is still unable to do other things what he not suppose to do. You can use encryption, restrict by user access control or roles, return a short live token or whatsoever to make it harder if you are concern. Bob doesn't have full access to the database such as Delete a table or updating other user's data. The queries or available commands must be very limited.