Enterprise Tools Are Overkill
Jamf, Kandji, and Mosyle cost $3-15/device/month and require MDM infrastructure. Great for large teams, but massive overhead for individuals and small teams.
Automated auditing that catches misconfigurations before they become breaches. 37+ checks. Open source. Privacy-first.
brew install macsentry/tap/macsentry
No signup required. One command. Done.
$ macsentry
╭─────────────────────────────────────────╮
│ macSentry v1.0.0 │
│ Security Audit for macOS │
╰─────────────────────────────────────────╯
ℹ Running 37 security checks...
CRITICAL ISSUES (2)
✗ FileVault encryption is disabled
✗ Firewall is not enabled
WARNINGS (3)
! SSH remote login enabled
! Automatic login is enabled
! Screen lock delay > 5 minutes
PASSED (32)
✓ System Integrity Protection enabled
✓ Gatekeeper enabled
✓ XProtect up to date
... and 29 more checks passed
───────────────────────────────────────────
Completed in 28.4s | 2 critical · 3 warnings · 32 passed
Watch a real security audit in under 30 seconds. No editing, no tricks—just actual output.
From a real macOS Sequoia audit
Completed in 28.4s
Run your first security audit in under 60 seconds.
macOS has excellent security foundations, but misconfigurations happen. Here's why most solutions fall short.
Jamf, Kandji, and Mosyle cost $3-15/device/month and require MDM infrastructure. Great for large teams, but massive overhead for individuals and small teams.
You know you should verify FileVault, firewall, and SIP regularly. But when did you last actually check? Security requires consistency.
Antivirus catches malware but ignores critical misconfigurations. Disabled SIP? Weak permissions? They won't tell you.
Set it once and let macSentry keep watch. Automated, thorough, and completely transparent.
FileVault, firewall, SIP, Gatekeeper, SSH, privacy permissions, app entitlements, and more. Comprehensive coverage.
Set it once via launchd, runs daily in the background. No manual effort required. True set-and-forget automation.
Clear findings with step-by-step remediation guidance. Know exactly what to fix and how to fix it.
All checks run locally. No data leaves your Mac. No telemetry, no phone home. Your security data stays yours.
Full audit completes in ~30 seconds. No heavy agents or background processes hogging your system resources.
MIT license. Fully auditable code. Community-driven development. Free forever. Trust through transparency.
Install via Homebrew or pip and run your first security audit immediately.
# Install via Homebrew (recommended)
$ brew install macsentry/tap/macsentry
Recommended for most users. Handles dependencies automatically.
# Install via pip
$ pip install macsentry
Use with virtual environments. Requires Python 3.10+.
# Run your first security audit
$ macsentry
# Set up automated daily checks (optional)
$ macsentry --install-schedule
Install Homebrew first by running:
$ /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
After installation, follow the instructions to add Homebrew to your PATH.
Check your Python version:
$ python3 --version
If below 3.10, install a newer version via Homebrew:
$ brew install python@3.12
Some security checks require elevated privileges. Run with sudo:
$ sudo macsentry
This is only needed for certain checks like FileVault status. Basic checks work without sudo.
macSentry requires macOS 13 (Ventura) or later. Check your macOS version:
$ sw_vers
If you're on macOS 12 or earlier, please update via System Settings → General → Software Update.
On newer macOS/Python versions, use a virtual environment:
# Create and activate a virtual environment
$ python3 -m venv ~/.macsentry-env
$ source ~/.macsentry-env/bin/activate
$ pip install macsentry
Or use pipx for isolated installation: pipx install macsentry
Full support for modern macOS versions. Intel and Apple Silicon.
Real output from a macSentry audit. Clear categories, actionable findings.
$ macsentry --verbose
╭─────────────────────────────────────────────────────────╮
│ macSentry v1.0.0 │
│ Comprehensive Security Audit for macOS │
╰─────────────────────────────────────────────────────────╯
System: macOS 15.1 (Sequoia) on MacBook Pro (M3 Pro)
Started: 2024-12-06 14:32:18
ℹ Running 37 security checks across 8 categories...
━━━ ENCRYPTION & DATA PROTECTION ━━━
✗ FileVault Encryption
Status: Disabled
Fix: sudo fdesetup enable
✓ Secure Boot — Full Security
✓ Signed System Volume — Enabled
━━━ SYSTEM PROTECTION ━━━
✓ System Integrity Protection — Enabled
✓ Gatekeeper — App Store and identified developers
✓ XProtect — Version 5198 (up to date)
✓ MRT (Malware Removal Tool) — Enabled
━━━ NETWORK SECURITY ━━━
✗ Application Firewall
Status: Disabled
Fix: sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setglobalstate on
! SSH Remote Login
Status: Enabled (potential risk if not needed)
Fix: sudo systemsetup -setremotelogin off
✓ Stealth Mode — Enabled
━━━ AUTHENTICATION ━━━
! Automatic Login
Status: Enabled for user 'admin'
Fix: System Settings → Users & Groups → Automatic login: Off
! Screen Lock Delay
Status: 15 minutes (recommended: ≤5 minutes)
Fix: System Settings → Lock Screen → Require password: Immediately
✓ Password Hints — Disabled
✓ Guest Account — Disabled
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
SUMMARY
● Critical Issues: 2
● Warnings: 3
● Passed Checks: 32
Completed in 28.4 seconds
Full report saved to: ~/.macsentry/reports/2024-12-06.json
ℹ Run macsentry --fix for guided remediation
Comprehensive coverage across 8 security categories. Filter and explore all checks below.
| Check Name | Category | Severity | Description |
|---|---|---|---|
| FileVault Encryption | Encryption | Critical | Verifies full-disk encryption is enabled via FileVault 2 |
| Secure Boot | Encryption | High | Checks Secure Boot is set to Full Security mode |
| Signed System Volume | Encryption | High | Ensures the system volume has cryptographic integrity |
| System Integrity Protection | System | Critical | Verifies SIP is enabled to protect system files |
| Gatekeeper | System | Critical | Ensures only signed apps from identified developers can run |
| XProtect Status | System | High | Checks Apple's built-in malware scanner is enabled and up to date |
| MRT (Malware Removal Tool) | System | Medium | Verifies the Malware Removal Tool is active |
| Automatic Updates | System | High | Ensures automatic security updates are enabled |
| App Update Check | System | Medium | Verifies automatic App Store updates are enabled |
| Application Firewall | Network | Critical | Checks the built-in application firewall is enabled |
| Stealth Mode | Network | Medium | Verifies firewall stealth mode to ignore ping requests |
| SSH Remote Login | Network | High | Checks if SSH remote login is disabled (unless needed) |
| Remote Apple Events | Network | Medium | Ensures remote Apple Events are disabled |
| Remote Management | Network | High | Verifies remote management (ARD) is not enabled |
| Content Caching | Network | Low | Checks content caching status and configuration |
| Automatic Login | Auth | Critical | Ensures automatic login is disabled |
| Screen Lock Delay | Auth | High | Verifies screen lock activates within 5 minutes |
| Password Hints | Auth | Medium | Checks that password hints are disabled |
| Guest Account | Auth | High | Ensures guest account is disabled |
| Root User Status | Auth | High | Verifies root user is disabled |
| Sudo Timeout | Auth | Medium | Checks sudo session timeout is appropriately configured |
| Password Policy | Auth | Medium | Verifies password complexity requirements |
| Location Services | Privacy | Low | Reviews location services configuration |
| Analytics Sharing | Privacy | Low | Checks if analytics data sharing is enabled |
| Ad Tracking | Privacy | Low | Verifies personalized ad tracking is limited |
| Safari Privacy | Privacy | Medium | Reviews Safari privacy and tracking settings |
| Siri Data Sharing | Privacy | Low | Checks Siri audio recording and analysis settings |
| Spotlight Suggestions | Privacy | Low | Verifies Spotlight web suggestions are configured |
| App Notarization | Apps | High | Checks for non-notarized applications |
| Developer Tools | Apps | Medium | Reviews developer tool access permissions |
| Accessibility Permissions | Apps | Medium | Audits apps with accessibility API access |
| Full Disk Access | Apps | High | Reviews apps granted full disk access |
| Screen Recording | Apps | Medium | Audits apps with screen recording permissions |
| Input Monitoring | Apps | High | Checks for apps monitoring keyboard/mouse input |
| Camera Access | Apps | Medium | Reviews apps with camera access permissions |
| Microphone Access | Apps | Medium | Reviews apps with microphone access permissions |
Transparent, auditable, and built with your privacy in mind.
| Feature | macSentry | Lynis | Enterprise MDM Jamf, Kandji, Mosyle |
|---|---|---|---|
| Price | Free | Free / $$ Enterprise | $3-15/device/mo |
| macOS Native | ✓ | ~ Linux-focused | ✓ |
| Security Checks | 37+ macOS specific | 200+ (mostly Linux) | Varies by vendor |
| Scheduled Monitoring | ✓ launchd native | ~ Manual cron | ✓ |
| Privacy | ✓ 100% local | ✓ Local | ✗ Cloud-based |
| Setup Time | < 1 minute | 5-10 minutes | Hours to days |
| MDM Infrastructure | ✓ Not required | ✓ Not required | ✗ Required |
| Open Source | ✓ MIT License | ✓ GPL v3 | ✗ Proprietary |
| Best For | Individuals & small teams | Linux admins, compliance | Large enterprises |
No account needed. No credit card. Just run the command.
Install macSentry today and find out what you've been missing. It takes less than a minute.
🛡️ macSentry
Free & Open Source
Open source. Community driven. Trusted by security-conscious developers.