

Such a sandbox is a core part of the macOS security stack. Some applications such as Google’s Chrome browser have even gone so far as to build a separate sandbox into themselves so that any content they load (such as when visiting a webpage) cannot affect the application in any negative way. The “sandbox” is simply a concept that when the operating system (OS) launches an application, the OS limits what the application is allowed to do that may affect the device at large. In the world of software security, the concept of a “sandbox” has been commonly used to allow applications that may not be completely trustworthy to run on trusted devices.

For those of you who didn't have access to the talk or would rather read than listen, let’s learn a bit more about his research. Patrick Wardle, principle security researcher at Jamf, presented at BlackHat on an interesting approach to escaping the App Sandbox in macOS with a little help from Microsoft Office.
