Do not open a public GitHub issue for security vulnerabilities.
Email ch1rag@outlook.in with a description of the issue. I will acknowledge within 72 hours and aim to release a patch within 14 days.
In scope:
- Logic that modifies TCC database entries
- JavaScript injection surface in the WKWebView layer
- Any scenario where user data (file contents, database values) could be exposed or transmitted unintentionally
- Any unexpected outbound network behavior from the app or its bundled web content
Out of scope:
- Issues that require SIP (System Integrity Protection) to be disabled
- Social engineering or phishing attacks
Clearance always operates on a user-provided copy of the TCC database. It does not request elevated privileges, does not access /var/db/TCC, and does not modify any file the user has not explicitly opened.
Clearance bundles sql.js 1.10.3 and its WASM file locally. It does not require internet access to open or edit databases, and it does not use analytics, accounts, or a backend service.