ADB Access
Placeholder: The primary access mechanism is ADB with the leaked Humane ADB certificate. This is likely the only infiltration method available.
Blocked Communication
Placeholder: Communication methods blocked by SELinux:
- Direct network access
- DNS
- Sockets
- Unix domain sockets (almost works but no app-to-shell communication)
- Named pipes
File-based communication between processes is possible. The shell user has networking permission and can act as a bridge.
Binder Services
Placeholder: Binder access is restricted by SELinux policy. Available services for untrusted_app:
audioserver_servicecameraserver_servicedrmserver_servicemediaserver_service/mediaextractor_service/mediametrics_service/mediadrmserver_servicenfc_serviceradio_serviceapp_api_servicevr_manager_service
The nfc and radio domains are accessible via CVE-2024-31317, which is the communication method used by the PenumbraOS SDK.
Other Restrictions
Placeholder:
- Touchpad access blocked from userland (data can be intercepted by
shelluser) - Services cannot be started directly using
startServicefromuntrusted_app - No
untrusted_apptosystem_appcommunication