diff --git a/private/wificond.te b/private/wificond.te
index b9e48b2b50a234f0bb47a859e77d1af126024d15..5476e33858dc85e21afeeec385417fb51d03bde1 100644
--- a/private/wificond.te
+++ b/private/wificond.te
@@ -1,6 +1,3 @@
 typeattribute wificond coredomain;
 
 init_daemon_domain(wificond)
-
-# TODO(b/36790991): Remove this once wificond is no longer permitted to touch wpa sockets
-typeattribute wificond socket_between_core_and_vendor_violators;
diff --git a/public/wificond.te b/public/wificond.te
index dd22d26b12a9792c9e4342819b6b89fe472c44f2..73b4be18d67c22118bc64f9931186cad604625a5 100644
--- a/public/wificond.te
+++ b/public/wificond.te
@@ -7,10 +7,6 @@ binder_call(wificond, system_server)
 
 add_service(wificond, wificond_service)
 
-# wificond writes firmware paths to this file.
-# wificond also changes the owership of this file on startup.
-allow wificond sysfs_wlan_fwpath:file { w_file_perms setattr };
-
 set_prop(wificond, wifi_prop)
 set_prop(wificond, ctl_default_prop)
 
@@ -35,11 +31,6 @@ allow wificond wifi_data_file:file create_file_perms;
 # wificond changes the ownership of some files before dropping root
 allow wificond self:capability { setuid setgid setpcap chown };
 
-# wificond cleans up sockets created by wpa_supplicant and framework
-allow wificond wpa_socket:dir rw_dir_perms;
-allow wificond system_wpa_socket:sock_file unlink;
-allow wificond wpa_socket:sock_file unlink;
-
 # dumpstate support
 allow wificond dumpstate:fd use;
 allow wificond dumpstate:fifo_file write;