iOS
Required software
- iOS/iPadOS 11+
- Xcode version 15.0 or later
Include MobileProtectionShield into your project
After obtaining the framework, open your project in Xcode, select the correct target, go to "General" tab and add MobileProtectionShield.xcframework to "Frameworks and Libraries", make sure to not embed the dependency, it's a static library.
Configure Your Project
Your project will need to specify some URL schemes to allow the MobileProtectionShield to detect some other applications that are related to Jailbreak. In your main target's Info.plist add the following items:
<key>LSApplicationQueriesSchemes</key>
<array>
<string>undecimus</string>
<string>sileo</string>
<string>zbra</string>
<string>filza</string>
<string>activator</string>
</array>
Note: This step is optional but can greatly improve the detection of compromised environments. In your main target Info.plist
Secrets
import MPS
let mps = MPS.load() // Load the library
let secretValue: String = mps.get<SecretKey>()
Compromised environment verifications
import MPS // 1) Import
print(MPS.Version)
let mps = MPS.load() // Load the library
let isJailbroken: Bool = mps.isJailbroken
let isBeingReverseEngineered: Bool = mps.isBeingReverseEngineered
let isBlockingSimulator: Bool = mps.isBlockingSimulator
let code: String = mps.code // This code can be used to know why the device is compromised.