If you believe you have found a security or privacy issue in this project, please report it privately.
- Email:
dev@uinaf.dev
Private reports are preferred. If you are unsure whether something is sensitive, email first instead of opening a public issue.
Useful reports usually involve:
- Arbitrary write to a TCC database that bypasses the documented sudo / Full Disk Access requirements
- Privilege escalation through the CLI
- Input handling that lets an attacker grant or revoke permissions for an unintended client
- Service-name resolution flaws that route a write to the wrong database or the wrong row
- Credential, token, or secret leakage in logs, errors, or JSON output
Out of scope:
- macOS SIP blocking writes — the operating system enforcing its own policy.
- The user being prompted for Full Disk Access — Apple's TCC subsystem doing its job.
- Bugs in Apple's
tccutil,csrutil, or SQLite. Report those upstream.
- Test only against TCC databases on machines you control.
- Use only test bundle IDs and paths you own when reporting.
- Keep testing non-destructive and away from production machines you depend on.
Only the latest release receives security fixes. The project is maintained on a best-effort basis.
Please allow a reasonable amount of time to investigate and fix before sharing details publicly. If the report is valid, we will work on a fix and coordinate disclosure.