I would be able to help you. LuckyPatcher now has a builder app which user installs to build LuckyPatcher with a random application ID(package name) for every build.
Once LuckyPatcher is built with a random package name, the user uninstalls the builder so app like yours cannot detect its existence.
Since LuckyPatcher now exists on the user’s device with a random package name, then it’s very difficult to detect its existence.
I solved the detection problem by coming up with a random package name detector algorithm. The algorithm detects all random package named hacking tools, which allow the app to determine if to stop working or not.
That’s the best way to deal with these hacking tools at the moment if you want to rely on the existence of LuckyPatcher and similar tools on the user’s device.
Write a good random package name detector + write another that blacklists all previous releases by package names, before the latest random-package name patch, and prevent your app from working for the user if any of these apps are installed.