某个APP检测了越狱状态,导致不能砸壳,咋整

在非越狱设备上正常启动,在越狱设备上启动就crash

需求: 在越狱设备上正常启动

日志: (例如iOS系统的日志,OS X上相关操作的日志,etc)

在系统的log中发现其主动调用了abort()

Exception Type:  EXC_CRASH (SIGABRT)
Exception Codes: 0x0000000000000000, 0x0000000000000000
Exception Note:  EXC_CORPSE_NOTIFY
Triggered by Thread:  3

Application Specific Information:
abort() called

Filtered syslog:
None found

Last Exception Backtrace:
0   CoreFoundation                	0x18b2eefe0 __exceptionPreprocess + 124
1   libobjc.A.dylib               	0x189d50538 objc_exception_throw + 55
2   CoreFoundation                	0x18b2f5ef4 -[NSObject+ 1261300 (NSObject) doesNotRecognizeSelector:] + 139
3   CoreFoundation                	0x18b2f2f54 ___forwarding___ + 915
4   CoreFoundation                	0x18b1eed4c _CF_forwarding_prep_0 + 91
5   libobjc.A.dylib               	0x189d60ee0 objc_setProperty_nonatomic_copy + 43
6   xxxxxxxxxxxxxx                	0x100b6fefc 0x10006c000 + 11550460
7   xxxxxxxxxxxxxx                	0x100b1d60c 0x10006c000 + 11212300
8   xxxxxxxxxxxxxx                	0x100b1d400 0x10006c000 + 11211776
9   xxxxxxxxxxxxxx                	0x100b1e260 0x10006c000 + 11215456
10  xxxxxxxxxxxxxx                	0x10398b4bc 0x10006c000 + 59897020
11  xxxxxxxxxxxxxx                	0x10398ba98 0x10006c000 + 59898520
12  libdispatch.dylib             	0x18a1a69e0 _dispatch_call_block_and_release + 23
13  libdispatch.dylib             	0x18a1a69a0 _dispatch_client_callout + 15
14  libdispatch.dylib             	0x18a1b50d4 _dispatch_queue_override_invoke + 643
15  libdispatch.dylib             	0x18a1b6a50 _dispatch_root_queue_drain + 539
16  libdispatch.dylib             	0x18a1b67d0 _dispatch_worker_thread3 + 123
17  libsystem_pthread.dylib       	0x18a3af100 _pthread_wqthread + 1095
18  libsystem_pthread.dylib       	0x18a3aecac start_wqthread + 3

所以怀疑有越狱检测,那么请问大佬们通过什么样的方式可以让我对其进行砸壳呢?

最优雅的,就是写个tweak,在启动的时候,sleep一个足够长的时间。