This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.

ADB Hack Permissions

  • WRITE_SECURE_SETTINGS
  • READ_LOGS
  • SET_VOLUME_KEY_LONG_PRESS_ LISTENER
  • CHANGE CONFIGURATION
  • DUMP