This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.
ADB Hack Permissions