Scope of attribution
Attribution covers the macOS app (Swift, SwiftUI, AppKit), the Chrome browser extension (Manifest V3, Web APIs), the project website, and all design assets. It does not replace individual license files inside bundled packages.
MacShield is built on open-source libraries, Apple SDK frameworks, web platform standards, and community knowledge. Every dependency, framework, and inspiration behind MacShield is listed here with full credit to its owners and maintainers.
MacShield is a native macOS app and Chrome browser extension. It is built on top of open-source Swift packages, Apple platform SDK frameworks, Google Chrome extension APIs, and W3C web standards. This page credits every dependency, its maintainer, its role in MacShield, and the applicable license.
Attribution covers the macOS app (Swift, SwiftUI, AppKit), the Chrome browser extension (Manifest V3, Web APIs), the project website, and all design assets. It does not replace individual license files inside bundled packages.
If you are auditing MacShield for license compliance, use this page as the dependency map. For full license texts, refer to the LICENSE file in this repository and the upstream package repositories listed below.
MacShield is designed, developed, and maintained by one individual as an open-source project.
MacShield is owned and maintained by Vivek W (AryanVBW). All MacShield source code, design assets, documentation, and website content in this repository are authored by Vivek W unless specific files or bundled dependencies state otherwise through their own copyright notices or license headers.
MacShield respectfully credits MakLock as a key directional inspiration for native macOS app-locking design.
MakLock is an open-source macOS application that demonstrated a thoughtful, system-level approach to protecting macOS apps with native overlays and authentication. MacShield's native app-locking architecture builds upon and extends those ideas, adding Touch ID, Apple Watch proximity unlock, browser privacy blur, and Website Lock into a unified product.
MacShield gives special credit to MakLock and its author, Maciej Dutkiewicz, for proving that a clean, open-source approach to macOS app protection was achievable and valuable. No source code from MakLock is directly included in MacShield. MakLock is licensed under the MIT License.
github.com/dutkiewiczmaciej/MakLock →The native MacShield macOS app includes two third-party open-source Swift packages managed through Swift Package Manager.
| Package | Maintainer | Role in MacShield | License |
|---|---|---|---|
|
Sparkle 2 Swift Package Manager |
Sparkle Project contributors | Delivers automatic update checks, update UI presentation, and delta update support for the MacShield macOS app. Users are notified of new releases without leaving the app. | BSD-style Sparkle License Open source |
|
HotKey Swift Package Manager |
Sam Soffes and contributors | Registers and handles the global keyboard panic shortcut that instantly locks all protected apps with one keystroke, regardless of which app is in focus. | MIT License Open source |
|
MakLock Inspiration only |
Maciej Dutkiewicz | Open-source inspiration for native macOS app-locking concepts, overlay behavior, and app-protection user experience. No code is directly copied; credited for directional influence. | MIT License Open source |
MacShield uses Apple SDK frameworks for all core native behavior. These ship with macOS and are governed by Apple's developer program terms, not open-source licenses.
| Framework | Owner | Role in MacShield | Terms |
|---|---|---|---|
| SwiftUI | Apple Inc. | Declarative UI framework powering the onboarding flow, settings window, menu bar popover, and all native interface components of the macOS app. | Apple SDK Terms |
| AppKit | Apple Inc. | Menu bar app lifecycle, NSPanel-based overlay windows, app launch detection, focus observation, and protected app switching behavior. | Apple SDK Terms |
| LocalAuthentication | Apple Inc. | Touch ID and device biometric evaluation via LAContext. Provides the primary unlock pathway and falls back to device passcode where Touch ID is unavailable. |
Apple SDK Terms |
| Security / Keychain Services | Apple Inc. | Encrypted local storage for the backup password. Stored in the macOS Keychain under the MacShield bundle identifier. Never transmitted externally. | Apple SDK Terms |
| CoreBluetooth | Apple Inc. | Apple Watch proximity detection. MacShield monitors Bluetooth RSSI from a paired Apple Watch and automatically locks or unlocks protected apps based on configured distance thresholds. | Apple SDK Terms |
| IOKit | Apple Inc. | System idle-time detection for the auto-lock feature. MacShield reads HID idle time counters to trigger locking when the user has been inactive for the configured duration. | Apple SDK Terms |
| ServiceManagement | Apple Inc. | Login item registration via the modern SMAppService API on macOS 13+, enabling MacShield to start at login without legacy Launch Agent plists. |
Apple SDK Terms |
| UserNotifications | Apple Inc. | Optional system notification delivery for lock events, failed authentication attempts, and Apple Watch disconnect alerts. | Apple SDK Terms |
The MacShield Chrome extension uses Google's Manifest V3 extension platform and built-in Chrome APIs. No third-party JavaScript libraries are bundled with the extension.
| API or platform | Owner | Role in MacShield extension | Terms |
|---|---|---|---|
| Chrome Extension APIs (MV3) | Google LLC / Chromium project | Manifest V3 runtime, background service worker, content scripts, messaging, declarativeNetRequest, and extension lifecycle management. | Chrome Web Store terms & Chromium BSD |
| chrome.storage.local | Google LLC / Chromium project | Local-only storage for the hashed extension password, protected domain list, blur settings, session unlock state, and user preferences. Data does not leave the device. | Chrome Extension APIs Terms |
| chrome.tabs | Google LLC / Chromium project | Tab query and navigation interception used by Website Lock to block page loads on protected domains before content renders. | Chrome Extension APIs Terms |
| content_scripts (CSS injection) | Google LLC / Chromium project | Content scripts inject per-site CSS blur rules onto supported messaging platforms (WhatsApp, Gmail, Slack, Discord, and others). No message content is read. | Chrome Extension APIs Terms |
The browser extension uses two W3C web platform APIs that are implemented natively by Chrome, with no external library dependency.
| Standard | Governing body | Role in MacShield extension | Type |
|---|---|---|---|
| Web Crypto API | W3C / browser implementers | Password hashing via SubtleCrypto.digest() with SHA-256 and a random 16-byte salt. The resulting hash is stored locally. The plaintext password is never persisted anywhere. |
Open web standard |
| WebAuthn (Web Authentication API) | W3C / FIDO Alliance / browser vendors | Platform biometric authentication (Touch ID, Windows Hello, Android biometric) for extension unlock where the browser and OS support it. Falls back to password-based unlock where unavailable. | Open web standard |
| CSS Blur / backdrop-filter | W3C CSS Working Group | CSS visual blur rules injected by content scripts to obscure chat message text on supported platforms. The extension only modifies CSS visual properties; it never reads message content. | Open web standard |
All MacShield design assets, icon artwork, screenshots, and website code are created specifically for this project by the MacShield author.
The MacShield shield icon is designed for this project and used across the macOS app, Chrome extension, website, and all marketing materials. The icon is part of the MacShield project and is not available under an open-source license.
Screenshots under docs/ show actual MacShield UI. They are captured from the application and owned by the MacShield project unless otherwise stated in individual file headers.
The website uses Syne (700–800 weight) for headings and DM Sans (300–700 weight) for body text. Both are loaded via Google Fonts and fall back to system UI fonts. No font files are bundled in the repository.
The MacShield website is hosted on GitHub Pages from the docs/ directory. No JavaScript frameworks, CMS, or third-party analytics are used. All HTML, CSS, and JS is hand-authored.
Syne and DM Sans typefaces are served by Google Fonts (fonts.googleapis.com). This is the only external network request made by the website. No user data is collected through this request beyond what Google Fonts logs per its own terms.
The aryanvbw.github.io/MacShield site is served by GitHub Pages, a static site hosting service by GitHub Inc. (Microsoft). Content delivery is managed by GitHub's CDN infrastructure.
A quick-reference list of the licenses that apply to MacShield's components and dependencies.
MacShield source code, documentation, and website are released under the MIT License. Copyright 2026 Vivek W (AryanVBW). See the LICENSE file in the root of this repository for the full license text.
Sparkle is distributed under the BSD-style Sparkle License. See github.com/sparkle-project/Sparkle → for the full text. The license requires preservation of the copyright notice and disclaimer.
BSD-style Sparkle LicenseHotKey by Sam Soffes is released under the MIT License. See github.com/soffes/HotKey → for the full text.
MIT LicenseMakLock by Maciej Dutkiewicz is released under the MIT License. No MakLock source code is directly included in MacShield. See github.com/dutkiewiczmaciej/MakLock →.
MIT LicenseSwiftUI, AppKit, LocalAuthentication, Security, CoreBluetooth, IOKit, ServiceManagement, and UserNotifications are Apple proprietary frameworks. Their use is governed by the Apple Developer Program License Agreement and the macOS SDK terms.
Apple SDK TermsThe Chrome Extension platform and APIs are provided by Google LLC under the Chrome Web Store Developer Program Policies. The Chromium source code underlying these APIs is available under a BSD-style license at chromium.googlesource.com →.
Chrome / Chromium TermsThese are open web platform standards defined by the W3C. They are implemented royalty-free by browser vendors including Google (Chrome). No separate license is required to use them.
Open Web Standard (W3C)MacShield is a solo open-source project. Community contributions in the form of bug reports, feature suggestions, pull requests, and code review are welcomed and credited.
All contributor credit lives in Git commit history, release notes, pull request descriptions, and changelogs. If you contributed a fix, feature, translation, or documentation improvement, your GitHub handle and contribution are recorded in the project history.
Open an issue or pull request on the MacShield GitHub repository. Bug reports, reproducible test cases, documentation improvements, and code contributions are all valuable. Please read the contributing guidelines before opening a pull request.
If an attribution is missing, inaccurate, or needs updating, please open a GitHub issue with the correct details.