Thanks for answering.
I currently reproduce the exploit with a free cert and a mobileprovision I extracted from XCode (7 days signing, free account, whatever random XCode ents uses) then I use codesign with custom entitlements (codesign -f -s “cert” —entitlements=psychicpaperents.plist app.app and finally install with ideviceinstaller.
Psychic paper gives you arbitrary entitlements due to different entitlement parsers in iOS.
I understand this is pretty niche, but would be very helpful for legacy exploitation, since asking non-savvy users to do all of this just for a sandbox escape isn’t very friendly.