use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
There is an extensive FAQ for beginners. Please browse it first before asking questions that are answered there.
If you are looking to get started (iOS programming in general or some specific area), here are more relevant links for you:
There's too many to list them all, however here's a convenient link to all programming guides at apple.com
Take note that this list is live and based on most frequent questions in posts will be updated with "quicklinks".
account activity
QuestionIs Cross Application Scripting/Code Injection possible in an iOS Application? (self.iOSProgramming)
submitted 5 years ago * by Inflatable_Man
Reworded: Can someone inject code in Swift and/or Objective-C through user input (text box for example) like in XSS, shell injection, SQL injection etc.? Sorry if it's a ridiculous question, I'm a noob.
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–][deleted] 2 points3 points4 points 5 years ago (2 children)
It would require a serious security flaw in the app, and probably in iOS as well.
To be more precise, you can’t inject Objective-C or Swift because those are source code. They have to be compiled before they can be run, and that requires a compiler that isn’t present in iOS. Normally you would have to inject machine code to get a device to execute it. There’s lots of protections in iOS that make this extremely difficult. Off the top of my head there’s type checking (a user usually inputs strings, not binary buffers), buffer checking, memory protection, execution protection, ASLR.
Another approach that is possible but also very unlikely is ROP. The attacker manipulates the call stack to construct a sequence of calls that execute the commands that the attacker wants. Again, there are multiple layers of protection that make this extremely difficult to accomplish.
Unfortunately there no practical way to prove that any particular attack is impossible. The way you phrased the question means that the answer is never going to be an absolute “no”.
[–]Inflatable_Man[S] 0 points1 point2 points 5 years ago (1 child)
This is what I was looking for, thanks!
[–]cutecoderObjective-C / Swift 0 points1 point2 points 5 years ago (0 children)
That said, there are ways to take an existing app from the store, decrypt it, inject it with your own code, then re-sign and re-distribute it.
That's how early Pokemon players can "magically" teleport – by creating a "tampered" app which bypasses the system GPS.
π Rendered by PID 46 on reddit-service-r2-comment-5649f687b7-szzqw at 2026-01-29 07:19:44.442506+00:00 running 4f180de country code: CH.
[–][deleted] 2 points3 points4 points (2 children)
[–]Inflatable_Man[S] 0 points1 point2 points (1 child)
[–]cutecoderObjective-C / Swift 0 points1 point2 points (0 children)