diff --git a/docs/os/macos-overview.md b/docs/os/macos-overview.md index f5c6e9ae..621bf71d 100644 --- a/docs/os/macos-overview.md +++ b/docs/os/macos-overview.md @@ -195,7 +195,7 @@ Just because one of an app's processes is sandboxed doesn't mean they all are. Alternatively, you can check apps before you run them by running this command in the terminal: ``` zsh -% codesign -dvvv --entitlements - +codesign -dvvv --entitlements - ``` If an app is sandboxed, you should see the following output: @@ -215,7 +215,7 @@ The [Hardened Runtime](https://developer.apple.com/documentation/security/harden You can check if an app uses the Hardened Runtime using this command: ``` zsh -codesign --display --verbose /path/to/bundle.app +codesign -dv ``` If Hardened Runtime is enabled, you will see `flags=0x10000(runtime)`. The `runtime` output means Hardened Runtime is enabled. There might be other flags, but the runtime flag is what we're looking for here.