Skip to content

Security: cch1rag/Clearance

Security

SECURITY.md

Security Policy

Reporting a Vulnerability

Do not open a public GitHub issue for security vulnerabilities.

Email ch1rag@outlook.in with a description of the issue. I will acknowledge within 72 hours and aim to release a patch within 14 days.


Scope

In scope:

  • Logic that modifies TCC database entries
  • JavaScript injection surface in the WKWebView layer
  • Any scenario where user data (file contents, database values) could be exposed or transmitted unintentionally
  • Any unexpected outbound network behavior from the app or its bundled web content

Out of scope:

  • Issues that require SIP (System Integrity Protection) to be disabled
  • Social engineering or phishing attacks

Notes

Clearance always operates on a user-provided copy of the TCC database. It does not request elevated privileges, does not access /var/db/TCC, and does not modify any file the user has not explicitly opened.

Clearance bundles sql.js 1.10.3 and its WASM file locally. It does not require internet access to open or edit databases, and it does not use analytics, accounts, or a backend service.

There aren't any published security advisories