Open-source attribution

Credits and Attribution

MacShield is built on open-source libraries, Apple SDK frameworks, web platform standards, and community knowledge. Every dependency, framework, and inspiration behind MacShield is listed here with full credit to its owners and maintainers.

Open source MIT-compatible stack Apple SDK licensed Last updated April 2026
Overview

What this page covers

MacShield is a native macOS app and Chrome browser extension. It is built on top of open-source Swift packages, Apple platform SDK frameworks, Google Chrome extension APIs, and W3C web standards. This page credits every dependency, its maintainer, its role in MacShield, and the applicable license.

01

Scope of attribution

Attribution covers the macOS app (Swift, SwiftUI, AppKit), the Chrome browser extension (Manifest V3, Web APIs), the project website, and all design assets. It does not replace individual license files inside bundled packages.

02

License compliance

If you are auditing MacShield for license compliance, use this page as the dependency map. For full license texts, refer to the LICENSE file in this repository and the upstream package repositories listed below.

Authorship

Project owner

MacShield is designed, developed, and maintained by one individual as an open-source project.

V

Vivek W — AryanVBW

MacShield is owned and maintained by Vivek W (AryanVBW). All MacShield source code, design assets, documentation, and website content in this repository are authored by Vivek W unless specific files or bundled dependencies state otherwise through their own copyright notices or license headers.

Special credit

Special inspiration credit

MacShield respectfully credits MakLock as a key directional inspiration for native macOS app-locking design.

MakLock — by Maciej Dutkiewicz

MakLock is an open-source macOS application that demonstrated a thoughtful, system-level approach to protecting macOS apps with native overlays and authentication. MacShield's native app-locking architecture builds upon and extends those ideas, adding Touch ID, Apple Watch proximity unlock, browser privacy blur, and Website Lock into a unified product.

MacShield gives special credit to MakLock and its author, Maciej Dutkiewicz, for proving that a clean, open-source approach to macOS app protection was achievable and valuable. No source code from MakLock is directly included in MacShield. MakLock is licensed under the MIT License.

github.com/dutkiewiczmaciej/MakLock →
macOS app — third-party

macOS app dependencies

The native MacShield macOS app includes two third-party open-source Swift packages managed through Swift Package Manager.

Package Maintainer Role in MacShield License
Sparkle 2
Swift Package Manager
Sparkle Project contributors Delivers automatic update checks, update UI presentation, and delta update support for the MacShield macOS app. Users are notified of new releases without leaving the app. BSD-style Sparkle License
Open source
HotKey
Swift Package Manager
Sam Soffes and contributors Registers and handles the global keyboard panic shortcut that instantly locks all protected apps with one keystroke, regardless of which app is in focus. MIT License
Open source
MakLock
Inspiration only
Maciej Dutkiewicz Open-source inspiration for native macOS app-locking concepts, overlay behavior, and app-protection user experience. No code is directly copied; credited for directional influence. MIT License
Open source
macOS app — Apple SDK

Apple platform frameworks

MacShield uses Apple SDK frameworks for all core native behavior. These ship with macOS and are governed by Apple's developer program terms, not open-source licenses.

Framework Owner Role in MacShield Terms
SwiftUI Apple Inc. Declarative UI framework powering the onboarding flow, settings window, menu bar popover, and all native interface components of the macOS app. Apple SDK Terms
AppKit Apple Inc. Menu bar app lifecycle, NSPanel-based overlay windows, app launch detection, focus observation, and protected app switching behavior. Apple SDK Terms
LocalAuthentication Apple Inc. Touch ID and device biometric evaluation via LAContext. Provides the primary unlock pathway and falls back to device passcode where Touch ID is unavailable. Apple SDK Terms
Security / Keychain Services Apple Inc. Encrypted local storage for the backup password. Stored in the macOS Keychain under the MacShield bundle identifier. Never transmitted externally. Apple SDK Terms
CoreBluetooth Apple Inc. Apple Watch proximity detection. MacShield monitors Bluetooth RSSI from a paired Apple Watch and automatically locks or unlocks protected apps based on configured distance thresholds. Apple SDK Terms
IOKit Apple Inc. System idle-time detection for the auto-lock feature. MacShield reads HID idle time counters to trigger locking when the user has been inactive for the configured duration. Apple SDK Terms
ServiceManagement Apple Inc. Login item registration via the modern SMAppService API on macOS 13+, enabling MacShield to start at login without legacy Launch Agent plists. Apple SDK Terms
UserNotifications Apple Inc. Optional system notification delivery for lock events, failed authentication attempts, and Apple Watch disconnect alerts. Apple SDK Terms
Chrome extension

Browser extension dependencies

The MacShield Chrome extension uses Google's Manifest V3 extension platform and built-in Chrome APIs. No third-party JavaScript libraries are bundled with the extension.

API or platform Owner Role in MacShield extension Terms
Chrome Extension APIs (MV3) Google LLC / Chromium project Manifest V3 runtime, background service worker, content scripts, messaging, declarativeNetRequest, and extension lifecycle management. Chrome Web Store terms & Chromium BSD
chrome.storage.local Google LLC / Chromium project Local-only storage for the hashed extension password, protected domain list, blur settings, session unlock state, and user preferences. Data does not leave the device. Chrome Extension APIs Terms
chrome.tabs Google LLC / Chromium project Tab query and navigation interception used by Website Lock to block page loads on protected domains before content renders. Chrome Extension APIs Terms
content_scripts (CSS injection) Google LLC / Chromium project Content scripts inject per-site CSS blur rules onto supported messaging platforms (WhatsApp, Gmail, Slack, Discord, and others). No message content is read. Chrome Extension APIs Terms
Web platform

Web platform standards

The browser extension uses two W3C web platform APIs that are implemented natively by Chrome, with no external library dependency.

Standard Governing body Role in MacShield extension Type
Web Crypto API W3C / browser implementers Password hashing via SubtleCrypto.digest() with SHA-256 and a random 16-byte salt. The resulting hash is stored locally. The plaintext password is never persisted anywhere. Open web standard
WebAuthn (Web Authentication API) W3C / FIDO Alliance / browser vendors Platform biometric authentication (Touch ID, Windows Hello, Android biometric) for extension unlock where the browser and OS support it. Falls back to password-based unlock where unavailable. Open web standard
CSS Blur / backdrop-filter W3C CSS Working Group CSS visual blur rules injected by content scripts to obscure chat message text on supported platforms. The extension only modifies CSS visual properties; it never reads message content. Open web standard
Design and content

Assets and website

All MacShield design assets, icon artwork, screenshots, and website code are created specifically for this project by the MacShield author.

📱

App and extension icon

The MacShield shield icon is designed for this project and used across the macOS app, Chrome extension, website, and all marketing materials. The icon is part of the MacShield project and is not available under an open-source license.

📷

Product screenshots

Screenshots under docs/ show actual MacShield UI. They are captured from the application and owned by the MacShield project unless otherwise stated in individual file headers.

Typography

The website uses Syne (700–800 weight) for headings and DM Sans (300–700 weight) for body text. Both are loaded via Google Fonts and fall back to system UI fonts. No font files are bundled in the repository.

🌐

Website platform

The MacShield website is hosted on GitHub Pages from the docs/ directory. No JavaScript frameworks, CMS, or third-party analytics are used. All HTML, CSS, and JS is hand-authored.

Google Fonts

Syne and DM Sans typefaces are served by Google Fonts (fonts.googleapis.com). This is the only external network request made by the website. No user data is collected through this request beyond what Google Fonts logs per its own terms.

🔗

GitHub Pages hosting

The aryanvbw.github.io/MacShield site is served by GitHub Pages, a static site hosting service by GitHub Inc. (Microsoft). Content delivery is managed by GitHub's CDN infrastructure.

License reference

Licenses summary

A quick-reference list of the licenses that apply to MacShield's components and dependencies.

MacShield (this project)

MacShield source code, documentation, and website are released under the MIT License. Copyright 2026 Vivek W (AryanVBW). See the LICENSE file in the root of this repository for the full license text.

MIT License

Sparkle 2

Sparkle is distributed under the BSD-style Sparkle License. See github.com/sparkle-project/Sparkle → for the full text. The license requires preservation of the copyright notice and disclaimer.

BSD-style Sparkle License

HotKey

HotKey by Sam Soffes is released under the MIT License. See github.com/soffes/HotKey → for the full text.

MIT License

MakLock (inspiration)

MakLock by Maciej Dutkiewicz is released under the MIT License. No MakLock source code is directly included in MacShield. See github.com/dutkiewiczmaciej/MakLock →.

MIT License

Apple SDK frameworks

SwiftUI, AppKit, LocalAuthentication, Security, CoreBluetooth, IOKit, ServiceManagement, and UserNotifications are Apple proprietary frameworks. Their use is governed by the Apple Developer Program License Agreement and the macOS SDK terms.

Apple SDK Terms

Chrome Extension APIs

The Chrome Extension platform and APIs are provided by Google LLC under the Chrome Web Store Developer Program Policies. The Chromium source code underlying these APIs is available under a BSD-style license at chromium.googlesource.com →.

Chrome / Chromium Terms

Web Crypto API and WebAuthn

These are open web platform standards defined by the W3C. They are implemented royalty-free by browser vendors including Google (Chrome). No separate license is required to use them.

Open Web Standard (W3C)
Community

Contributors

MacShield is a solo open-source project. Community contributions in the form of bug reports, feature suggestions, pull requests, and code review are welcomed and credited.

How contribution credit works

All contributor credit lives in Git commit history, release notes, pull request descriptions, and changelogs. If you contributed a fix, feature, translation, or documentation improvement, your GitHub handle and contribution are recorded in the project history.

How to contribute

Open an issue or pull request on the MacShield GitHub repository. Bug reports, reproducible test cases, documentation improvements, and code contributions are all valuable. Please read the contributing guidelines before opening a pull request.

Corrections

Missing or incorrect attribution

If an attribution is missing, inaccurate, or needs updating, please open a GitHub issue with the correct details.

To report a missing or incorrect attribution, open a GitHub issue and include: (1) the project or asset name, (2) the correct owner or maintainer, (3) the applicable license, and (4) a link to where MacShield uses it. Attribution corrections are taken seriously and applied promptly.