blob: e75c115e54db9225e647e26b1db0a1a651f62577 [file] [log] [blame]
{
"name": "EZTamperDetection",
"version": "1.0.0",
"summary": "A small class to determine if it's code is exectued on a jailbroken device.",
"description": "This tamper detection can be integrated into an iOS Application or Framework. It tests for common hot spots on jailbroken devices:\n\nan open sandbox\nfilesystem abnormalities\nApplication directory type\nexistence of certain dynamic libraries\nOn a vanilla jailbroken iOS 9.0.2 device it detects filesystem abnormalities and if the Application directory is replaced by a symbolic link. Method names are rather cryptic on purpose.",
"homepage": "https://github.com/effzehn/EZTamperDetection",
"license": "MIT",
"authors": {
"Andre Hoffmann": "dev@effzehn.de"
},
"source": {
"git": "https://github.com/effzehn/EZTamperDetection.git",
"tag": "1.0.0"
},
"platforms": {
"ios": "8.0"
},
"requires_arc": true,
"source_files": "Pod/Classes/**/*"
}