Only the latest release of MacSift receives security fixes. If you're running an older version, upgrade before reporting — the bug may already be fixed.
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
MacSift touches the filesystem and can delete data. If you find a bug that could lead to data loss, privilege escalation, or unintended deletion:
Please do not open a public GitHub issue. Instead, report it privately:
- Open a private security advisory on GitHub, or
- Email the repository owner through their GitHub profile.
Include:
- A short description of the issue and its impact.
- A reproducer — the smallest scenario that triggers the problem.
- The macOS version and
swift --versionoutput you tested on. - Whether you've tried to verify the issue on the latest
main.
- Any path traversal / directory escape that could cause MacSift to delete files outside its scanned roots.
- Any case where the
neverDeletePrefixessafety guard can be bypassed. - Any case where dry-run mode is shown enabled in the UI but a real delete actually runs.
- Any case where
FileManager.trashItemis bypassed andunlinkis called directly on user data. - Any privilege escalation via the scanner subprocess invocations (
tmutil).
Bugs that don't match those categories are welcome as regular GitHub issues.
I'll acknowledge within a few days and discuss a fix / disclosure timeline. MacSift is a personal project, not a commercial product — there's no SLA. I'll do my best.