Difference between revisions of "Constraint: ADB Hacked"
(Created page with "<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device...") |
|||
Line 1: | Line 1: | ||
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.</pre> | <pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.</pre> | ||
− | + | <span style="color: #0E9549; font-size: 24px;">'''ADB Hack Permissions'''</span><br/> | |
* WRITE_SECURE_SETTINGS | * WRITE_SECURE_SETTINGS | ||
* READ_LOGS | * READ_LOGS |
Revision as of 19:15, 16 February 2024
This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.
ADB Hack Permissions
- WRITE_SECURE_SETTINGS
- READ_LOGS
- SET_VOLUME_KEY_LONG_PRESS_ LISTENER
- CHANGE CONFIGURATION
- DUMP