Apps can read log buffer of their own. Since modules actually
runs in target app's process, Xposed bridge logs are readable
by app and become a detection method of injection. Nowadays,
real world apps start to use this method (such as iMobile Pay) to
detect Xposed and Zygisk injection, so remove redundant logs
to prevent possible issues.
Apps probably have 100 ways to detect injection, so best effort is
to implement this module remotely, but that is a different story.
Apps can read log buffer of their own. Since modules actually runs in target app's process, Xposed bridge logs are readable by app and become a detection method of injection. Nowadays, real world apps start to use this method (such as iMobile Pay) to detect Xposed and Zygisk injection, so remove redundant logs to prevent possible issues.