Difference between revisions of "Constraint: ADB Hacked"
m |
|||
Line 1: | Line 1: | ||
− | <span style="color: #0E9549; font-size: 24px;">'''About this | + | <span style="color: #0E9549; font-size: 24px;">'''About this constraint '''</span> |
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked. | <pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked. | ||
Revision as of 21:00, 16 February 2024
About this constraint
This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked. It is ideal for technically advanced users who require specific automations for devices that have been altered beyond the standard configurations.
ADB Hack Permissions
* WRITE_SECURE_SETTINGS
* READ_LOGS
* SET_VOLUME_KEY_LONG_PRESS_ LISTENER
* CHANGE CONFIGURATION
* DUMP