Heartbleed is some information leak over the heartbeat channel of SSL. All of the examples you see are of things being stolen are of bad clients connecting to servers.
However, the heartbeat channel goes two ways. There's no reason that a bad server can't pull information from a client. This however, requires the application to connect to the bad server. If there's no way for client to connect to a bad server, there's no way for the bug to affect your software. So if, say, all your code does is post status updates on facebook, you're not connecting to a malicious server. If your app is a web browser, you connect to random things and need to make sure the version of OpenSSL is vulnerable.
Now, one mitigating factor is that you may not be using OpenSSL. If you're just using Java code, you're using the OS provided crypto and that's probably not affected. If you're using NDK you have to worry about any bundled OpenSSL.