Skip to content
  • There are no suggestions because the search field is empty.

High Risk Mobile Apps 2.0 Standard and Enterprise (Beta)

Effective February 5, 2026, Pixalate is introducing High Risk Mobile Apps 2.0 Standard and Enterprise (Beta), mobile app blocklists designed to give buyers deterministic, explainable control over app-level risk where impression-level IVT filtering is insufficient.

High Risk Mobile Apps 2.0 Standard and Enterprise (Beta) identify known dangerous and fraudulent apps by combining persistent IVT signals, app store compliance indicators, app-ads.txt authorization checks, and privacy risk signals into a single, unified feed with transparent risk reason codes. Each app is included based on defined inclusion thresholds, not probabilistic scoring.

This approach aligns with the property-level reporting requirements outlined in the MRC’s Invalid Traffic Detection and Filtration Interim Update Memo and reflects Pixalate’s continued evolution of app-level risk intelligence based on client feedback.

Why This Matters

Standard IVT measurement operates at the impression level. It does not always capture risk that is structural, persistent, or rooted in app-level behaviour or compliance status.

High Risk Mobile Apps 2.0 Standard and Enterprise (Beta) complement impression-level IVT detection by identifying mobile apps where risk cannot be reliably isolated or mitigated through impression-level filtering alone. These risks can expose buyers to compliance violations, brand safety issues, and wasted spend, even when impressions appear valid in isolation.

What's Included

High Risk Mobile Apps 2.0 Standard and Enterprise (Beta) provide app-level risk coverage across the following dimensions:

  • Invalid traffic based on sustained GIVT and SIVT thresholds

  • App store compliance, including privacy policy and listing status

  • Supply chain authorisation, via app-ads.txt validation

  • Child privacy compliance, including Verifiable Parental Consent (VPC) risk

  • Inventory quality, including Made for Advertising (MFA) indicators

Every app is tagged with explicit risk reason codes, providing transparency into why an app is flagged and enabling informed blocking decisions.


Risk Types

Risk Type

Code

Description

High GIVT

highGivt

Apps with General Invalid Traffic rates exceeding 5% over a 3-month rolling window

High SIVT

highSivt

Apps with Sophisticated Invalid Traffic rates exceeding 15% over a 3-month rolling window

Missing Privacy Policy

missingPrivacyPolicy

Apps missing mandatory privacy policies required by Google Play and Apple App Store

Abandoned App

abandonedApp

Apps that have not been updated by developers and may be unmaintained, insecure, or non-compliant with current app store requirements

Missing app-ads.txt

noAppTxt

Apps generating ad impressions without a valid app-ads.txt file, indicating unauthorized inventory

Developer Anonymity

developerAnonymity

Apps where the developer has missing or unverifiable contact information

VPC Bypass Risk

vpcBypass

Child-directed apps transmitting personal data without Verifiable Parental Consent, creating COPPA compliance exposure

Delisted App

delistedApp

Apps removed from app stores that continue to generate ad traffic

Made for Advertising

mfaApp

Apps designed primarily to generate ad impressions rather than deliver genuine user value, including apps exhibiting ad stacking and other manipulative ad placement tactics


Schema

High Risk Mobile Apps 2.0 Standard and Enterprise (Beta) evaluate each app against nine risk dimensions. An app can be flagged for multiple risk types simultaneously — for example, an app may be both abandoned and missing a privacy policy.

In High Risk Mobile Apps 2.0 Standard (Beta) version, when an app has multiple risk types, the riskType field displays the string value “various”. If you require visibility into all applicable risk types for each app, High Risk Mobile Apps 2.0 Enterprise (Beta) version is available that lists each risk type individually.

The probability field is set to 1 for all entries. High Risk Mobile Apps 2.0 Standard and Enterprise (Beta) use deterministic inclusion criteria — an app either meets the threshold for a risk type or it does not.


High Risk Mobile Apps 2.0 Standard (Beta)

Column

Type

Description

appId

STRING

The identifier for the mobile app (e.g., "310633997" or "com.whatsapp")

bundleId

STRING

The bundle ID associated with the app, if available

osName

STRING

The operating system associated with the app (iOS or Android)

riskType

STRING

Risk type code; displays the string value “various” when multiple risk types apply

probability

FLOAT

Value of 1 for all entries

appStoreUrl

STRING

URL to the app store listing

appStoreName

STRING

Name of the app store (Google Play or Apple App Store)

File Format: CSV

Delivery: FTP or S3 Bucket

Naming Convention: MobileHighRiskAppSelection_YYYYMMDD

Update Frequency: Daily


High Risk Mobile Apps 2.0 Enterprise (Beta)

High Risk Mobile Apps 2.0 Enterprise (Beta) provides full granularity by listing all applicable risk types as comma-separated values (e.g., highSivt,abandonedApp,missingPrivacyPolicy) instead of displaying various. This enables you to build custom blocking logic based on specific risk type combinations.

Contact your Customer Success representative to upgrade to High Risk Mobile Apps 2.0 Enterprise (Beta).

Access and Pricing

High Risk Mobile Apps 2.0 Standard (Beta) is included at no additional cost for the remainder of an existing client's current subscription term if they are subscribed to the High Risk App Mobile Apps 1.0 blocklist, subject to acceptance of the updated Master Subscription Terms (MST). Ongoing pricing will be addressed at renewal.

High Risk Mobile Apps 2.0 Enterprise (Beta) is available for clients who require full visibility into all applicable risk types per app. Enterprise exposes each risk type individually, enabling selective and differentiated blocking strategies rather than uniform app-level exclusions.

Contact your Customer Success representative to discuss upgrade options.

Deployment and Integration

After acceptance of the updated MST, Pixalate will enable access and provide delivery details for your FTP folder or S3 bucket

Most integrations will continue to function without change. Action is required only if:

  • Your integration relies on hard-coded legacy risk type names. These must be updated or removed.
  • Your blocking logic uses probability thresholds. All apps now have a probability value of 1, so filtering should be based on risk types instead.

Your Customer Success representative will confirm MST acceptance, access enablement, and next steps.

Timeline

  • February 5, 2026: Production rollout begins for clients who have accepted the updated MST

Clients with custom integrations or internal review requirements are encouraged to engage with Customer Success ahead of the rollout date to ensure continuity and avoid unintended blocking behaviour.