Right, but my point is that it's still not public information what entitlements apps use. Apple's policy is that users should not be able to read the contents of encrypted IPAs at all. The fact that you can do it doesn't make the information public - you have to go through extra steps, many of which are illegal to explain to you in most parts of the world, to be able to decrypt IPAs and read out the entitlements file therein.
As an example of how zealous Apple is about keeping apps encrypted; they even disable iOS app support entirely on M1 Macs if you've unlocked the hardware for third-party or modified operating systems: https://twitter.com/never_released/status/139070741193000140...
Nothing I did was illegal. I downloaded an IPA file with Apple Configurator 2, the binary inside it was encrypted. However it was possible to read the entitlement without decrypting the whole binary. One can certainly automate this process if one can figure out how to download IPA file automatically.