seatbelt-sandboxer
Generate minimal, allowlist-based macOS Seatbelt sandbox profiles for application isolation.
- Profiles restrict file, network, process, and IPC access through deny-all defaults with explicit allowlists across 15+ resource categories
- Includes step-by-step profiling methodology: identify requirements, start minimal, add file/network access, test iteratively with
sandbox-exec - Supports parameter substitution (HOME, WORKING_DIR) and path filters (subpath, literal, regex) for flexible configuration
- Handles multi-command applications by creating separate profiles per subcommand with a helper script dispatcher
- Provides network isolation options: block all, localhost-only, or unrestricted; includes common failure modes and fixes
macOS Seatbelt Sandbox Profiling
Generate minimally-permissioned allowlist-based Seatbelt sandbox configurations for applications.
When to Use
- User asks to "sandbox", "isolate", or "restrict" an application on macOS
- Sandboxing any macOS process that needs restricted file/network access
- Creating defense-in-depth isolation if supply chain attacks are a concern
When NOT to Use
- Linux containers (use seccomp-bpf, AppArmor, or namespaces instead)
- Windows applications
- Applications that legitimately need broad system access
- Quick one-off scripts where sandboxing overhead isn't justified
Profiling Methodology
More from trailofbits/skills
ask-questions-if-underspecified
Clarify requirements before implementing. Use when serious doubts arise.
4.2Ksemgrep
>-
3.8Kmodern-python
Configures Python projects with modern tooling (uv, ruff, ty). Use when creating projects, writing standalone scripts, or migrating from pip/Poetry/mypy/black.
3.8Kcodeql
>-
3.6Kinsecure-defaults
Detects fail-open insecure defaults (hardcoded secrets, weak auth, permissive security) that allow apps to run insecurely in production. Use when auditing security, reviewing config management, or analyzing environment variable handling.
3.5Ksecure-workflow-guide
Guides through Trail of Bits' 5-step secure development workflow. Runs Slither scans, checks special features (upgradeability/ERC conformance/token integration), generates visual security diagrams, helps document security properties for fuzzing/verification, and reviews manual security areas.
3.4K