Closed csexton closed 6 years ago
SandboxViolation: screencapture(3533) deny mach-register com.apple.screencapture.interactive Violation: deny mach-register com.apple.screencapture.interactive Process: screencapture [3533] Path: /usr/sbin/screencapture Load Address: 0x10b9ca000 Identifier: screencapture Version: ??? (???) Code Type: x86_64 (Native) Parent Process: Captured [3425] User ID: 501 Date/Time: 2016-09-12 17:59:16.324 EDT OS Version: Mac OS X 10.12 (16A320) Report Version: 8 Thread 0 (id: 46099): 0 libsystem_kernel.dylib 0x00007fff914b041a mach_msg_trap + 10 1 libxpc.dylib 0x00007fff915e14c3 xpc_pipe_routine + 232 2 libxpc.dylib 0x00007fff915e134d _xpc_interface_routine + 164 3 libxpc.dylib 0x00007fff915e8431 bootstrap_check_in3 + 134 4 libxpc.dylib 0x00007fff915e8399 bootstrap_check_in + 42 5 screencapture 0x000000010b9cbef3 6 libdyld.dylib 0x00007fff91389255 start + 1 7 screencapture 0x0000000000000003 Thread 1 (id: 46100): 0 libsystem_kernel.dylib 0x00007fff914b84e6 __workq_kernreturn + 10 1 libsystem_pthread.dylib 0x00007fff9159f221 start_wqthread + 13 Thread 2 (id: 46101): 0 libsystem_kernel.dylib 0x00007fff914b84e6 __workq_kernreturn + 10 1 libsystem_pthread.dylib 0x00007fff9159f221 start_wqthread + 13 Binary Images: 0x10b9ca000 - 0x10b9d2ff3 screencapture (99) <295fe153-7a8a-39d2-a15b-a0e9739f22e6> /usr/sbin/screencapture 0x7fff91384000 - 0x7fff91389ff3 libdyld.dylib (421.1) <cdfbdc9c-418c-369d-b433-f64b0630e640> /usr/lib/system/libdyld.dylib 0x7fff9149e000 - 0x7fff914c0ff7 libsystem_kernel.dylib (3789.1.32) <5c68a0d7-c3c9-3e52-b983-ede9a28ab6fc> /usr/lib/system/libsystem_kernel.dylib 0x7fff9159c000 - 0x7fff915a6fff libsystem_pthread.dylib (218.1.3) <050ae77b-4f4b-334a-a5ba-cf0d10af5304> /usr/lib/system/libsystem_pthread.dylib 0x7fff915dc000 - 0x7fff91605ff7 libxpc.dylib (972.1.5) <2a901937-48e1-3bf2-83f1-2431156d82b7> /usr/lib/system/libxpc.dylib
Couple of helpful resources from @eternalstorms
I'll give you a Sandbox Violation.