apple-events
Audited by Socket on Mar 8, 2026
1 alert found:
Obfuscated FileThis file is a binary plist / serialized application data blob (likely UI/window/view state) and not executable source code. It contains embedded tokens like 'eval' and 'sbwspblob' which are suspicious signals only insofar as they could be executed by a vulnerable consumer that unserializes this blob and passes contents to an evaluator. There is no direct evidence of network exfiltration, credential harvesting, shell execution, or other malicious behavior inside the fragment itself. Recommendation: treat the file as untrusted input — ensure any parser/deserializer used in the project does not perform automatic code execution or pass deserialized strings into eval-like sinks. If you control the consumer, audit deserialization and any dynamic-evaluation usage.