<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on RawCull</title><link>https://rawcull.netlify.app/tags/security/</link><description>Recent content in Security on RawCull</description><generator>Hugo</generator><language>en</language><lastBuildDate>Fri, 27 Mar 2026 15:07:49 +0100</lastBuildDate><atom:link href="https://rawcull.netlify.app/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Security &amp; Privacy</title><link>https://rawcull.netlify.app/docs/security/</link><pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate><guid>https://rawcull.netlify.app/docs/security/</guid><description>&lt;h2 id="security--privacy"&gt;Security &amp;amp; Privacy&lt;a class="td-heading-self-link" href="#security--privacy" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;RawCull is built from the ground up with macOS security and user privacy as first-class concerns. The following is a precise and detailed account of every security mechanism the application employs, derived directly from the source code and project configuration.&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id="app-sandbox"&gt;App Sandbox&lt;a class="td-heading-self-link" href="#app-sandbox" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;RawCull runs inside the &lt;strong&gt;macOS App Sandbox&lt;/strong&gt; (&lt;code&gt;com.apple.security.app-sandbox = true&lt;/code&gt;), enforced by the operating system. The entitlements file contains only this single declaration — no additional entitlements are granted. This means:&lt;/p&gt;</description></item><item><title>Security-Scoped URLs</title><link>https://rawcull.netlify.app/blog/2026/02/05/security-scoped-urls/</link><pubDate>Thu, 05 Feb 2026 00:00:00 +0000</pubDate><guid>https://rawcull.netlify.app/blog/2026/02/05/security-scoped-urls/</guid><description>&lt;p&gt;Security-scoped URLs are a cornerstone of macOS App Sandbox security. RawCull uses them to gain persistent, user-approved access to source and destination folders while remaining fully sandbox-compliant. This article walks through exactly how the implementation works, tracing the code from user interaction through to file operations.&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id="what-are-security-scoped-urls"&gt;What Are Security-Scoped URLs?&lt;a class="td-heading-self-link" href="#what-are-security-scoped-urls" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;A security-scoped URL is a special file URL that carries a cryptographic capability granted by macOS, representing explicit user consent to access a specific file or folder. Without it, a sandboxed app cannot read or write anything outside its own container.&lt;/p&gt;</description></item></channel></rss>