<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.</pre>
+
<span style="color: #0E9549; font-size: 24px;">'''About this restriction'''</span><br/>
+
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.
+
+
It is ideal for technically advanced users who require specific automations for devices that have been altered beyond the standard configurations.</pre>