The latest one (as in current build). I might introduce a better release version approach if people find this useful.
Report the vulnerability through the GitHub Security tab "Report a vulnerability" and I will liaise.
The following areas are considered in-scope security vulnerabilities. Please report these through the GitHub Security tab as described above.
- Living off the land vulnerabilities in preset global allow list entries — if a process included in the built-in global allowlist can be abused to exfiltrate data or bypass protections without modification, that is a security issue.
- XPC service manipulation and Touch ID / auth flow circumvention — attacks that subvert the XPC communication between the app and the system extension, or that bypass the Touch ID / authorisation prompts to gain elevated access.
- Policy database manipulation — techniques that allow an unprivileged process to alter stored policies in a way that is not reflected in the GUI or is not authorised by the user.
The following are not treated as security vulnerabilities. Please report them as enhancements or bugs instead.
- App preset gaps — a built-in app protection that does not cover every sensitive path for a given application is a coverage gap, not a security vulnerability.
- Policy enforcement failures — a process that is denied by policy but still manages to access a file due to a kernel or OS behaviour outside ClearanceKit's control should be reported as a bug.