Replies: 1 comment 1 reply
-
Most Android APIs are only protected by Android permissions, the same UID has the same Android permissions. Shizuku apps run their codes under the same UID as the Shizuku server (if Shizuku is started by adb, the UID is 2000; for root, is 0). However, it is impossible to drop some Android permissions at runtime. So, your requirement is impossible. Btw, most Shizuku apps in the real world are not implemented by executing commands :) |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Shizuku should have a permission system, to allow users to have granular control over the ADB cmds that the client apps can execute.
For example, "App Ops" only needs to run
adb shell appops *
(and other cmds), it doesn't needadb shell wm *
Beta Was this translation helpful? Give feedback.
All reactions