iOS IPA Injection & Visualization -- 2

Замовник: AI | Опубліковано: 12.12.2025

Core Requirements: Software Analysis and Extraction: The contractor must use legal and compliant tools to extract the target software's IPA files from official channels and perform static and dynamic analysis to understand the software's internal structure and enable legitimate optimization and enhancement. Data Visualization Function Development: Develop a lightweight dynamic library to implement a "viewpoint" perspective function, designed to help visualize certain data during internal testing. This function is hidden by default and can only be activated through specific gestures or passwords, and must not interfere with the normal operation or core functionality of the software. Seamless Connection and Security: The injected dynamic library must ensure that the connection between the software and the original server is unaffected and will not tamper with or interfere with core functionality. The injection process must strictly comply with iOS development specifications and must not trigger any anti-fraud mechanisms or violate platform rules. Device Authorization Binding: Ensure that the software is bound to a specified authorized device (verified via UDID), and is limited to installation and use on authorized devices. Technical Requirements: Legal Tools and Platform Compliance: The contractor must use legal and compliant tools to extract the IPA file. All injection and modification operations must comply with the iOS development platform's regulations, avoiding any actions that violate development specifications, cause memory leaks, crashes, or other issues. Deliverables: A signed and valid IPA file + installation tutorial, ensuring successful installation on the specified devices; A "Viewpoint" feature user manual, detailing how to activate and use the feature; A complete interoperability verification report, ensuring that the injected functionality will not affect the normal operation of the application and will not trigger any anti-fraud mechanisms. Data Confidentiality and Security Requirements: The contractor must strictly maintain the confidentiality of all involved technical data and documents, and ensure that all related files are deleted after project completion. No related data may be retained or leaked.