Critical-risk tools in Preflight Ios
7 of the 82 tools in Preflight Ios are classified as critical risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at critical risk
-
simulator_delete_deviceDestructive 4/5Permanently delete a simulator device by UDID or name.
-
simulator_eraseDestructive 4/5Factory reset a simulator device. Erases all content and settings.
-
simulator_grant_permissionDestructive 4/5Grant, revoke, or reset app permissions (camera, location, photos, contacts, microphone, etc.).
-
simulator_keychainDestructive 5/5Manipulate the device keychain: add root certificates, add certificates, or reset the entire keychain.
-
simulator_storekit_delete_transactionsDestructive 4/5Delete all StoreKit test transactions. Clears purchase history for fresh testing.
-
simulator_storekit_reset_eligibilityDestructive 4/5Reset introductory offer eligibility for all StoreKit products. Allows re-testing intro pricing.
-
simulator_uninstall_appDestructive 4/5Uninstall an app from the simulator by bundle ID.
Attacks that target this class
Critical-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Preflight Ios
Enforce policy on Preflight Ios
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init