Skip to main content

iOS

Required software

  • iOS/iPadOS 11+
  • Xcode version 15.0 or later

Include MobileProtectionShield into your project

After obtaining the framework, open your project in Xcode, select the correct target, go to "General" tab and add MobileProtectionShield.xcframework to "Frameworks and Libraries", make sure to not embed the dependency, it's a static library.

Configure Your Project

Your project will need to specify some URL schemes to allow the MobileProtectionShield to detect some other applications that are related to Jailbreak. In your main target's Info.plist add the following items:

<key>LSApplicationQueriesSchemes</key>
<array>
<string>undecimus</string>
<string>sileo</string>
<string>zbra</string>
<string>filza</string>
<string>activator</string>
</array>

Note: This step is optional but can greatly improve the detection of compromised environments. In your main target Info.plist

Secrets

import MPS

let mps = MPS.load() // Load the library
let secretValue: String = mps.get<SecretKey>()

Compromised environment verifications

import MPS // 1) Import

print(MPS.Version)

let mps = MPS.load() // Load the library
let isJailbroken: Bool = mps.isJailbroken
let isBeingReverseEngineered: Bool = mps.isBeingReverseEngineered
let isBlockingSimulator: Bool = mps.isBlockingSimulator
let code: String = mps.code // This code can be used to know why the device is compromised.