diff --git a/private/app_neverallows.te b/private/app_neverallows.te
index 9ad7cfed6aacbbffe5211ad066395afe1f68a82d..c730d708b4de4fe575f61408fca7c709ef4013d2 100644
--- a/private/app_neverallows.te
+++ b/private/app_neverallows.te
@@ -225,5 +225,6 @@ full_treble_only(`
     -hal_graphics_allocator_server
     -hal_cas_server
     -binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone
+    -untrusted_app_visible_halserver
   }:binder { call transfer };
 ')
diff --git a/public/attributes b/public/attributes
index ffd6316aecf281bc852e323c5765312662b8aec8..9ac302b360fc9a541312437c4a6a376906bcc7a4 100644
--- a/public/attributes
+++ b/public/attributes
@@ -157,6 +157,17 @@ expandattribute vendor_executes_system_violators false;
 # app-visibility.
 attribute untrusted_app_visible_hwservice;
 
+# halserver domains that are accessible to untrusted applications.  These
+# domains are typically those hosting  hwservices attributed by the
+# untrusted_app_visible_hwservice.
+# WARNING: Use of this attribute should be avoided unless absolutely necessary.
+# It is a temporary allowance to aid the transition to treble and will be
+# removed in the future platform version, requiring all halserver domains that
+# are labeled with this attribute to be submitted to AOSP in order to maintain
+# their app-visibility.
+attribute untrusted_app_visible_halserver;
+expandattribute untrusted_app_visible_halserver false;
+
 # PDX services
 attribute pdx_endpoint_dir_type;
 attribute pdx_endpoint_socket_type;