Difference between revisions of "Constraint: ADB Hacked"

(Created page with "<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device...")
 
 
(6 intermediate revisions by 2 users not shown)
Line 1: Line 1:
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.</pre>
+
<pre class="header-style">This constraint allows or prevents a macro/feature from running based on whether the device has the ADB hack applied.</pre>
''''ADB Hack Permissions:'''''
+
 
* WRITE_SECURE_SETTINGS
+
''' Options '''
* READ_LOGS
+
 
* SET_VOLUME_KEY_LONG_PRESS_ LISTENER
+
* '''ADB Hack Applied''': Constraint passes only when the ADB hack is applied
* CHANGE CONFIGURATION
+
* '''Not ADB hacked''': Constraint passes only when the ADB hack is not applied
* DUMP
+
* '''ADB Permissions to Check''': Choose one or more permissions to verify. All selected permissions must match the chosen state.
 +
** '''WRITE_SECURE_SETTINGS''' - Access to secure system settings
 +
** '''READ_LOGS''' - Read system log output
 +
** '''SET_VOLUME_KEY_LONG_PRESS_LISTENER''' - Detect volume key long-press events
 +
** '''CHANGE_CONFIGURATION''' - Change certain system configuration settings
 +
** '''DUMP''' - Access additional system debug information
 +
 
 +
''' Example '''
 +
 
 +
''Example 1: Turn off data when screen is on if the ADB hack is applied''
 +
  <pre class="trigger-style">Triggers
 +
 
 +
Screen On/Off - Screen On</pre>
 +
  <pre class="action-style">Actions
 +
 
 +
Set Wi-Fi State (Enable)
 +
Mobile Data On/Off (Disable)</pre>
 +
  <pre class="constraint-style">Constraints
 +
 
 +
ADB Hacked - ADB Hack Applied (WRITE_SECURE_SETTINGS)</pre>
 +
 
 +
''' Notes '''
 +
 
 +
* Use this constraint to gate macros that should only run after the ADB hack setup is completed
 +
 
 +
''' See Also '''
 +
 
 +
* [[Constraint: Rooted Device|Rooted Device Constraint]]

Latest revision as of 10:34, 9 January 2026

This constraint allows or prevents a macro/feature from running based on whether the device has the ADB hack applied.

Options

  • ADB Hack Applied: Constraint passes only when the ADB hack is applied
  • Not ADB hacked: Constraint passes only when the ADB hack is not applied
  • ADB Permissions to Check: Choose one or more permissions to verify. All selected permissions must match the chosen state.
    • WRITE_SECURE_SETTINGS - Access to secure system settings
    • READ_LOGS - Read system log output
    • SET_VOLUME_KEY_LONG_PRESS_LISTENER - Detect volume key long-press events
    • CHANGE_CONFIGURATION - Change certain system configuration settings
    • DUMP - Access additional system debug information

Example

Example 1: Turn off data when screen is on if the ADB hack is applied

Triggers

Screen On/Off - Screen On
Actions

Set Wi-Fi State (Enable)
Mobile Data On/Off (Disable)
Constraints

ADB Hacked - ADB Hack Applied (WRITE_SECURE_SETTINGS)

Notes

  • Use this constraint to gate macros that should only run after the ADB hack setup is completed

See Also