This module contains a small, standalone C++ implementation that performs best-effort user-space integrity probes (filesystem + /proc + environment).
It is designed to be embedded into any Linux/macOS process that wants lightweight runtime tamper signals, or into mobile apps (Android NDK / iOS).
- Scans for common root/jailbreak artifacts (paths)
- Checks for debugger attachment signals (
/proc/self/status→TracerPid) - Checks loaded mappings (
/proc/self/maps) for common injection frameworks (Frida, Xposed, Magisk, etc.) - Android-only: reads system properties for additional signals
- Apple-only: simulator +
DYLD_INSERT_LIBRARIESheuristic + jailbreak path probes
The output is a raw integer bitmask.
From the module root:
cmake -S . -B build
cmake --build build -j
./build/sys_nse_example#include "sys_nse.h"
uint32_t mask = sys_nse::sys_rt_p1_validate();- This is heuristic detection. Treat it as a signal, not proof.
/procchecks are only meaningful on Linux/Android.