Skip to content

Block App Access on Jailbroken, Developer Mode Enabled, or Rooted iOS Devices #55

@girishjadhav-cosmica

Description

@girishjadhav-cosmica

Description:

To enhance application security and prevent misuse, we need to restrict access to the app on compromised iOS devices.

This includes:

  • Jailbroken iPhones
  • Devices with Developer Mode enabled
  • Rooted or otherwise tampered iOS environments

Problem Statement:

Running the app on jailbroken or developer-enabled devices increases the risk of:

  • Reverse engineering
  • Runtime manipulation
  • Bypassing security controls
  • Data extraction
  • Unauthorized API access

Currently, the app does not actively block or restrict access on such devices.

Proposed Solution:

Implement runtime integrity checks to detect:

  1. Jailbreak indicators:

    • Presence of known jailbreak file paths (e.g., /Applications/Cydia.app)
    • Writable system directories
    • Suspicious dynamic libraries
  2. Developer Mode detection (iOS 16+)

  3. Debugger attachment detection

  4. Unauthorized code injection

If any of the above conditions are detected:

  • Prevent user login
  • Display a security warning message

Acceptance Criteria:

  • App blocks access on jailbroken devices
  • App blocks access when Developer Mode is enabled
  • Detection cannot be trivially bypassed
  • False positives are minimized
  • Security event logging is implemented

Additional Notes:

Consider leveraging:

  • Apple’s DeviceCheck / App Attest APIs
  • Runtime integrity verification
  • Anti-debugging techniques
  • Obfuscation for detection logic

Metadata

Metadata

Assignees

Labels

enhancementNew feature or request

Type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions