Skip to content

Commit

Permalink
Apply suggestions from code review
Browse files Browse the repository at this point in the history
Co-authored-by: Jeroen Beckers <[email protected]>
  • Loading branch information
cpholguera and TheDauntless authored Jan 3, 2025
1 parent b0cea4e commit 18ee1cf
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 4 deletions.
4 changes: 2 additions & 2 deletions demos/ios/MASVS-RESILIENCE/MASTG-DEMO-0088/MASTG-DEMO-0088.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ platform: ios
title: Testing Jailbreak Detection
code: [swift]
id: MASTG-DEMO-0x88
test: MASTG-TEST-0088
test: MASTG-TEST-0x88
---

### Sample
Expand All @@ -27,4 +27,4 @@ The output reveals the use of file permissions, protocol handlers and file direc

### Evaluation

The test fails because jailbreak detection checks implemented in the app.
The test passes because jailbreak detection checks are implemented in the app.
4 changes: 2 additions & 2 deletions tests-beta/ios/MASVS-RESILIENCE/MASTG-TEST-0x88.md
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
---
platform: ios
title: Testing Jailbreak Detection
title: Runtime Use of Jailbreak Detection Techniques
id: MASTG-TEST-0x88
type: [dynamic]
weakness: MASWE-0097
---

## Overview

The test verifies that a mobile application can identify whether if the iOS device it is running on a jailbroken device. Jailbreaking removes built-in security restrictions on the device, potentially exposing sensitive information and increasing the risk of unauthorised access.
The test verifies that a mobile application can identify if the iOS device it is running on a jailbroken device. Jailbreaking removes built-in security restrictions on the device, potentially exposing sensitive information and increasing the risk of unauthorized access.

## Steps

Expand Down

0 comments on commit 18ee1cf

Please sign in to comment.