同様のサービスは?
“This includes any code which passes arbitrary parameters to
dynamic methods such as dlopen(), dlsym(), respondsToSelector:,
performSelector:, method_exchangeImplementations(), and
running remote scripts in order to change app behavior or call
SPI, based on the contents of the downloaded script. Even if the
remote resource is not intentionally malicious, it could easily be
hijacked via a Man In The Middle (MiTM) attack, which can pose a
serious security vulnerability to users of your app.”
https://forums.developer.apple.com/thread/73640