You submitted a build, App Review came back citing Guideline 5.2.2, and the Resolution Center screenshot points at an AI-generated asset somewhere in your app. The rejection sits under the Legal: Intellectual Property header, so most builders assume the problem is a trademark. In practice, 5.2.2 is the third-party services rule, and that distinction shapes the fix.
Short answer
Guideline 5.2.2 fires when an asset in your build appears to display content from a third-party service such as Instagram, X, Spotify, or YouTube without authorization. AI image tools leak brand fragments often enough that this rejection has become routine for vibe-coded and no-code apps that source icons, splash screens, or in-app illustrations from a model. The clean fix is to identify the flagged element from the Resolution Center screenshot, regenerate it with a service-name exclusion list, sweep the rest of the bundle for similar leaks, attach a new build, and post a short factual reply. The rule text lives in Apple's App Review Guidelines, section 5.2.2.
What you should know
- 5.2.2 is the third-party services rule. It sits under the Legal: Intellectual Property section but is distinct from 5.2.1, which covers protected trademarks and copyrighted works.
- AI tools embed brand fragments across more than the icon. Splash screens, onboarding illustrations, settings glyphs, and marketing screenshots can all carry recognizable platform shapes.
- The Resolution Center screenshot is the brief. App Review highlights the exact element that triggered the citation. Read it before drafting anything else.
- A written argument without a new binary tends to fail. The reviewer wants a regenerated asset attached to a new build, not text explaining why the prior version was fine.
- The fix is asset-level. No Info.plist change, no entitlement, no Privacy Manifest edit clears this rejection.
Why does App Review cite 5.2.2 for an AI-generated asset?
The short answer is that the asset reads as content from another service. The exact wording of Guideline 5.2.2 says that if your app uses, accesses, monetizes access to, or displays content from a third-party service, you have to be specifically permitted to do so under that service's terms of use. App reviewers treat any visible asset (the icon, a splash screen, an onboarding illustration, a settings glyph) as part of that display surface. If the asset shows a stylized blue bird, the reviewer reads it as a claim about X. If it shows a green play triangle on a black square, the reviewer reads it as Spotify.
This is the rule reviewers reach for in the grey zone where the asset does not copy a registered mark precisely but still evokes a known platform. Guideline 5.2.1 is the cleaner citation for one-to-one trademark copies. 5.2.2 covers the larger surface of assets that look derived from a service without being identical.
The root cause sits in the training data. Image models see millions of brand logos during pretraining, and those logos are statistically over-represented for any prompt that mentions cameras, chat bubbles, music players, video icons, or shopping bags. A prompt as plain as "minimalist camera app splash screen" can produce a frame that reads as Instagram. A prompt for "onboarding illustration with a music note" can produce a Spotify-adjacent shape. The model does not know it is leaking; the reviewer does.
Which AI assets in a build trigger 5.2.2 most often?
The app icon gets the most attention, but the citation often points at other surfaces. Splash screens are the second most common trigger because they tend to use the same iconography style as the launcher icon. Onboarding illustrations are third, especially when the AI was asked to render social, music, or video themes for tutorial slides. In-app settings glyphs come fourth: a paint-bucket settings icon that reads as Discord, a notification glyph that reads as Snapchat.
Screenshots uploaded to App Store Connect can also trigger 5.2.2 even when the icon itself passes. A reviewer who looks at a screenshot showing fake content cards styled to look like Instagram or TikTok will cite the asset directly. The screenshot is part of the submitted bundle for review purposes, not just marketing.
The table below maps the most common asset surfaces to the typical platform leaks.
| Asset surface | Typical AI leak | Common platform association |
|---|---|---|
| App icon | Camera frame, gradient square | |
| Splash screen | Wave or pulse line | Spotify |
| Onboarding illustration | Bird silhouette, blue background | X (formerly Twitter) |
| Settings glyph | Speech bubble, ghost shape | Discord, Snapchat |
| Marketing screenshot | Mock content cards | TikTok, Instagram |
How do you sweep an IPA or AAB for brand-adjacent AI assets before resubmitting?
The short answer is to extract the bundle and walk through every visual asset by hand. On iOS, an IPA is a renamed zip; the Payload/<AppName>.app directory contains the Assets.car and any loose image files. The asset catalog tool inside Xcode (assetutil --info) or the open source cartool extracts every image as a PNG. On Android, an AAB or APK opens with bundletool or apktool, and the res/drawable-* and res/mipmap-* directories hold the same set.
Once the assets are extracted, three checks tend to catch the leaks before resubmission. First, scan the file list for anything platform-adjacent by name: tw_logo.png, insta_icon.png, spotify_share.png. AI-generated codebases sometimes ship debug filenames the developer never noticed. Second, run each visible asset through a reverse image search. Google Lens and TinEye both pick up logos that resemble registered marks. Third, look at every asset at small render size, around 60 by 60 pixels for icons and 120 by 120 for inline glyphs. If a casual viewer reads the asset as a known platform at that resolution, App Review will reach the same conclusion.
According to a thread on the Apple Developer Forums about a 5.2.2 rejection involving content that looked like third-party streaming material, reviewers expect the developer to either prove permission or remove the disputed element rather than argue the citation away.
What does a clean resubmission look like after a 5.2.2 hit?
The short answer is a regenerated asset, a new binary, and a short Resolution Center reply that names the change. App Review reviewers read dozens of replies a day. A short paragraph that names the action and confirms the new asset is original tends to clear the citation on the next pass.
A pattern that works:
"Thank you for the review. The asset flagged in the screenshot has been replaced with a new, original image generated from a custom prompt and verified against a reverse image search. The new version does not reference any third-party service, brand, or platform. The updated build is attached as version X.Y.Z."
Submit the new build before sending the reply. A reply without a new binary tends to trigger the same citation a second time. Where the citation pointed at a screenshot rather than a bundled asset, the screenshot can be updated in App Store Connect without a new binary, but the reply still needs to confirm the change explicitly.
If your app is a legitimate partner with the third-party service (the citation references your authorized integration with Spotify, for example), the resolution path is different. You attach written authorization from the platform showing the use is permitted, naming your developer account and the scope of use. Without that document the citation stays open.
When does 5.2.2 become 5.2.1 or 4.1(c)?
The short answer is that 5.2.1 covers exact trademark copies, 5.2.2 covers third-party service evocations, and 4.1(c) covers copying another developer's app icon or brand. The reviewer chooses the citation based on the kind of asset and the kind of claim.
Per the updated App Review Guidelines published in November 2025, section 4.1(c) targets the clone-app problem directly: using another developer's icon, brand, or product name in your own app's icon or name without explicit approval. An AI-generated icon that lands close to an existing App Store app (not a platform like Instagram but another shipping app) draws 4.1(c) rather than 5.2.2.
5.2.1 is reached when the AI output reproduces a registered trademark closely enough that the reviewer can name the trademark. A Nike swoosh, a Coca-Cola wordmark, a Disney castle silhouette. The fix is the same shape, regenerate without the mark, but the citation language gives you a stronger legal signal: the asset is potentially infringing, not just service-adjacent. Apple's trademark and copyright guidelines for third parties cover the broader trademark rule and clarify that Apple polices its own marks under a separate path.
What to watch out for
A few traps catch teams more than once.
The "same asset already shipped" argument does not work. App Review treats each submission independently, and an asset that passed in one build can be flagged in another. A reviewer with a fresh eye can call something the prior reviewer missed.
The "AI made it, so it cannot infringe" argument is the weakest of the common defenses. Apple is not adjudicating copyright; the reviewer is checking guideline compliance. Even if the AI output is not legally infringing, the reviewer can still cite 5.2.2 because the asset evokes a service.
The second-degree case catches careful teams: a clean primary asset with a small secondary element that itself reads as a brand. AI tools sometimes embed a tiny app icon, social glyph, or platform shape inside a larger illustration, especially in onboarding scenes that depict a phone or a feed. The reviewer catches it; you have to catch it first.
A practical detail: if your build includes Apple platform glyphs (the Apple emoji, the Activity ring shape, the iTunes mark) the citation is 5.2.5, not 5.2.2. The fix surface is similar, but the reply language has to acknowledge the specific Apple asset removed.
Key takeaways
- 5.2.2 rejections for AI-generated assets almost always mean the asset evokes a third-party platform, not that it copies a registered trademark. Read the Resolution Center screenshot before drafting a reply.
- The fix is asset-level: regenerate with an explicit exclusion list, sweep the rest of the bundle, and submit a new build before replying. A written argument without a new binary tends to fail.
- 5.2.1, 5.2.2, 4.1(c), and 5.2.5 are different citations with different evidence standards. Confusing them costs another review cycle.
- For teams that want a pre-submission read of the compiled IPA or AAB, including a sweep of bundled image assets for brand-adjacent shapes, PTKD.com (https://ptkd.com) is one of the platforms focused on pre-submission scanning aligned with OWASP MASVS for no-code and vibe-coded apps.
- If your app is a legitimate partner with a third-party service, attach written authorization with the resubmission, naming your developer account and the scope of use.



