Skip to content

Sentinel-One/macos-are-you-really-signed

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Are you really signed?

We are providing this tool to allow for easy testing of the recently discovered code-sign bypass vulnerability discovered by Okta. More information about the vulnerability itself can be found in the disclosure "I can be Apple, and so can you"

You can download the tool from this repository or compile it yourself, we are distributing it under the MIT License.

Usage

are-you-really-signed [-h] [-a] <Signed File>
Flags:
        -a: Check with 'anchor trusted' instead of 'anchor apple generic' - Pin to Cert Store instead of Apple Certs (for corporate purposes mostly).
        -h: Print help and usage

Return Codes
0 - Signed with valid chain validation (anchor apple)
1 - Signing evasion detected
2 - File not signed
3 - File not found/Usage

Example Usage

Signature Evasion Detection evasion detected

File that isn't signed not signed file

File that has valid signing and is pinned with the root trust (Apple by default, entire Trust store by flag -a) signed file

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages