Get the latest tech news
Can you trust that permission pop-up on macOS?
A security research blog.
The TCCAccessRequestIndirect function included a logic bug that resulted in the behavior I described at the start of this article: where a sender could specify one app which would be used to build and display the user consent prompt while also specifying another that would actually be inserted into the database as the one that requested the service. Consent prompts for access to specific directories could also be spoofed, but additional layers of security around files made it not very useful (although, unrelated, Apple did recently patch a filesystem-based sandbox escape). In this hypothetical example, if you were unfortunate enough to be tricked by the above prompt and click Allow you would be giving some unknown app half of what it needs to ultimately change your home folder, plant a fake TCC.db, and bypass the real database.
Or read this on Hacker News