Company
Date Published
Author
Armin Ronacher, Daniel Griesser
Word count
321
Language
English
Hacker News points
None

Summary

We released sentry-cocoa 3.10.0 to resolve a security incident that may have affected users on macOS apps without a sandbox, urging Mac users to update via CocoaPods, Carthage, or direct checkout. The issue was caused by events being sent to other users' Sentry apps and installations due to the lack of a sandbox, specifically when a user had two Sentry-based apps on their Mac and one crashed, sending its event to the other app's configured project. To fix this, we updated sentry-cocoa 3.10.0 to store crashes in sub-folders based on the client's DSN hash for security reasons, preventing older crashes from being sent after an update. Users who are not using sentry-cocoa or are using a sandbox do not need to take action, while those still using sentry-swift should update to sentry-cocoa 3.10.0.