@mjtsai the malicious code runs inside the legitimate app. That's how all flash exploits work. A user would notice an unusual dialog.
@mjtsai @drewthaler Which such APIs do that? There is a list of "temporary extensions" that are only temp for MAS https://developer.apple.com/library/mac/documentation/Miscellaneous/Reference/EntitlementKeyReference/Chapters/AppSandboxTemporaryExceptionEntitlements.html#//apple_ref/doc/uid/TP40011195-CH5-SW1 …
-
-
@rosyna@drewthaler For example, -[NSWorkspace openFile:]. The rules have changed several times w/ OS versions and are not documented. -
@mjtsai@drewthaler What rules for openFile:? You just need to call startAccessingSecurityScopedResource: first to punch a hole in sandbox -
@rosyna@drewthaler No, there are cases where the document can't be opened if the app for it isn’t sandboxed, even if you punch a hole. -
@mjtsai@drewthaler Do you have an example of that? Because LaunchServices handles openFile. -
@rosyna@drewthaler Not handy. DTS eventually explained it to me; they were initially unaware, too. I fear more undocumented cases like this -
@mjtsai@drewthaler Because restrictions on openFile: are mostly handled by Gatekeeper, not the sandbox. - View other replies
-
@rosyna@drewthaler Similar issue in that some AppleScripts don’t work from sandbox, even when run using NSUserAppleScriptTask. -
@mjtsai@drewthaler In both cases, you need to use security-scoped bookmarks and startAccessingSecurityScopedResource - View other replies
- Show more
-
-
@mjtsai@drewthaler (that is, non-MAS apps can always use these exceptions)
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Rosyna Keller
Michael Tsai
Drew Thaler