Configuring Entitlements for Jailbreak Bypass

PlayCover contains a set of rules to be used on an app under PlayCover/Rules in the source code and PlayCover.app/Contents/Resources in the built app. There is a default rule named default.yam and there may be rules meant for specific apps, case in which they will be named after their bundle id as com.mycompany.myapp.yaml.

An app will use the set of rules meant for it, or the default set if the former one does not exist.

Rules structure

A rules file contains four sections, which can be sorted into two types:

blacklist, whitelist | allow, bypass

The first two work on files, while the last ones work on sandbox rules.

Here is what the sections do: blacklist blocks files (not directories) from being accessed. whitelist allows writing to files outside default paths to be written to. allow are rules that are always applied. bypass are rules that are applied when JB Bypass is enabled.

Sandbox rules in allow are always added into the entitlements, regardless of the status of Jailbreak Bypass. The other ones are only active when JB Bypass is turned on.

By default, applications running under PlayCover have the same permissions as any other contained macOS applications. This however means that it gets access to syscalls and locations that iOS doesn't normally allow (eg. forking a process or read access to /usr/bin and /usr/sbin).

Identifying files and sandbox rules worth adding

The following directories contain Apple sandbox files by default. They can prove helpful for writing new sandbox profiles.

/Library/Sandbox/Profiles
/System/Library/Sandbox/Profiles
/usr/share/sandbox