High Risk Mobile Apps 2.0 Standard and Enterprise (Beta)
Effective February 5, 2026, Pixalate is introducing High Risk Mobile Apps 2.0 Standard and Enterprise (Beta), mobile app blocklists designed to give buyers deterministic, explainable control over app-level risk where impression-level IVT filtering is insufficient.
High Risk Mobile Apps 2.0 Standard and Enterprise (Beta) identify known dangerous and fraudulent apps by combining persistent IVT signals, app store compliance indicators, app-ads.txt authorization checks, and privacy risk signals into a single, unified feed with transparent risk reason codes. Each app is included based on defined inclusion thresholds, not probabilistic scoring.
This approach aligns with the property-level reporting requirements outlined in the MRC’s Invalid Traffic Detection and Filtration Interim Update Memo and reflects Pixalate’s continued evolution of app-level risk intelligence based on client feedback.
Why This Matters
Standard IVT measurement operates at the impression level. It does not always capture risk that is structural, persistent, or rooted in app-level behaviour or compliance status.
High Risk Mobile Apps 2.0 Standard and Enterprise (Beta) complement impression-level IVT detection by identifying mobile apps where risk cannot be reliably isolated or mitigated through impression-level filtering alone. These risks can expose buyers to compliance violations, brand safety issues, and wasted spend, even when impressions appear valid in isolation.
What's Included
High Risk Mobile Apps 2.0 Standard and Enterprise (Beta) provide app-level risk coverage across the following dimensions:
- Invalid traffic based on sustained GIVT and SIVT thresholds
- App store compliance, including privacy policy and listing status
- Supply chain authorisation, via app-ads.txt validation
- Child privacy compliance, including Verifiable Parental Consent (VPC) risk
- Inventory quality, including Made for Advertising (MFA) indicators
Every app is tagged with explicit risk reason codes, providing transparency into why an app is flagged and enabling informed blocking decisions.
Risk Types
|
Risk Type |
Code |
Description |
|
High GIVT |
highGivt |
Apps with General Invalid Traffic rates exceeding 5% over a 3-month rolling window |
|
High SIVT |
highSivt |
Apps with Sophisticated Invalid Traffic rates exceeding 15% over a 3-month rolling window |
|
Missing Privacy Policy |
missingPrivacyPolicy |
Apps missing mandatory privacy policies required by Google Play and Apple App Store |
|
Abandoned App |
abandonedApp |
Apps that have not been updated by developers and may be unmaintained, insecure, or non-compliant with current app store requirements |
|
Missing app-ads.txt |
noAppTxt |
Apps generating ad impressions without a valid app-ads.txt file, indicating unauthorized inventory |
|
Developer Anonymity |
developerAnonymity |
Apps where the developer has missing or unverifiable contact information |
|
VPC Bypass Risk |
vpcBypass |
Child-directed apps transmitting personal data without Verifiable Parental Consent, creating COPPA compliance exposure |
|
Delisted App |
delistedApp |
Apps removed from app stores that continue to generate ad traffic |
|
Made for Advertising |
mfaApp |
Apps designed primarily to generate ad impressions rather than deliver genuine user value, including apps exhibiting ad stacking and other manipulative ad placement tactics |
Schema
High Risk Mobile Apps 2.0 Standard and Enterprise (Beta) evaluate each app against nine risk dimensions. An app can be flagged for multiple risk types simultaneously — for example, an app may be both abandoned and missing a privacy policy.
In High Risk Mobile Apps 2.0 Standard (Beta) version, when an app has multiple risk types, the riskType field displays the string value “various”. If you require visibility into all applicable risk types for each app, High Risk Mobile Apps 2.0 Enterprise (Beta) version is available that lists each risk type individually.
The probability field is set to 1 for all entries. High Risk Mobile Apps 2.0 Standard and Enterprise (Beta) use deterministic inclusion criteria — an app either meets the threshold for a risk type or it does not.
High Risk Mobile Apps 2.0 Standard (Beta)
|
Column |
Type |
Description |
|
appId |
STRING |
The identifier for the mobile app (e.g., "310633997" or "com.whatsapp") |
|
bundleId |
STRING |
The bundle ID associated with the app, if available |
|
osName |
STRING |
The operating system associated with the app (iOS or Android) |
|
riskType |
STRING |
Risk type code; displays the string value “various” when multiple risk types apply |
|
probability |
FLOAT |
Value of 1 for all entries |
|
appStoreUrl |
STRING |
URL to the app store listing |
|
appStoreName |
STRING |
Name of the app store (Google Play or Apple App Store) |
File Format: CSV
Delivery: FTP or S3 Bucket
Naming Convention: MobileHighRiskAppSelection_YYYYMMDD
Update Frequency: Daily
High Risk Mobile Apps 2.0 Enterprise (Beta)
High Risk Mobile Apps 2.0 Enterprise (Beta) provides full granularity by listing all applicable risk types as comma-separated values (e.g., highSivt,abandonedApp,missingPrivacyPolicy) instead of displaying various. This enables you to build custom blocking logic based on specific risk type combinations.
Contact your Customer Success representative to upgrade to High Risk Mobile Apps 2.0 Enterprise (Beta).
Access and Pricing
High Risk Mobile Apps 2.0 Standard (Beta) is included at no additional cost for the remainder of an existing client's current subscription term if they are subscribed to the High Risk App Mobile Apps 1.0 blocklist, subject to acceptance of the updated Master Subscription Terms (MST). Ongoing pricing will be addressed at renewal.
High Risk Mobile Apps 2.0 Enterprise (Beta) is available for clients who require full visibility into all applicable risk types per app. Enterprise exposes each risk type individually, enabling selective and differentiated blocking strategies rather than uniform app-level exclusions.
Contact your Customer Success representative to discuss upgrade options.
Deployment and Integration
After acceptance of the updated MST, Pixalate will enable access and provide delivery details for your FTP folder or S3 bucket
Most integrations will continue to function without change. Action is required only if:
- Your integration relies on hard-coded legacy risk type names. These must be updated or removed.
- Your blocking logic uses probability thresholds. All apps now have a probability value of 1, so filtering should be based on risk types instead.
Your Customer Success representative will confirm MST acceptance, access enablement, and next steps.
Timeline
- February 5, 2026: Production rollout begins for clients who have accepted the updated MST
Clients with custom integrations or internal review requirements are encouraged to engage with Customer Success ahead of the rollout date to ensure continuity and avoid unintended blocking behaviour.