This little application demonstrates an insecure implementation of deep link activity with no URL authentication There is an exploit.html also placed that demonstrates and simulates a real time environment as to how one can exploit Vulnerable Deep Links
To learn how to exploit and properly implement a Deep Link follow the article on hackingarticles.in -> search for deep link