Closed Gaurav-CareMonitor closed 2 months ago
Hello @Gaurav-CareMonitor ,
we do not actively develop and support RASP for macOS applications. There will be false positives, as macOS naturally contains the files on paths, which are checked. You can ignore this check on macOS.
Kind regards, Talsec team
Sorry I don't think you got my point, The app is not macOS app but an iOS app only, which we are running on Mac after downloading from app store. So from flutter we can't know if its running on mac. Hence can't apply check accordingly.
Hello, sure, we understand the use case. However, the machine is still Mac, which has the files on expected paths, which are not present on iPhones, but naturally are on macOS. The check itself does not make sense for applications run on Mac.
We will not disclose what exactly is actually checked, but you can find similar detections in OWASP Guidelines:
https://mas.owasp.org/MASTG/0x06j-Testing-Resiliency-Against-Reverse-Engineering/#common-jailbreak-detection-checks
For example, there are /bin/sh
or /bin/bash
, which are definitely present on Mac.
Got it Thanks
Describe the bug When running the iOS app in macOS with M1 M2 chipset, the app throws
onPrivilegedAccess
We want to keep using the app on macOS, is there any workaround for this?