{
	"id": "79afe3ca-7d85-41a3-b14a-a2800688790e",
	"created_at": "2026-04-06T00:16:31.395667Z",
	"updated_at": "2026-04-10T13:11:23.979074Z",
	"deleted_at": null,
	"sha1_hash": "580a6bb518f5ae5a1de91bb70ef6172ab066ef4e",
	"title": "Hardened Runtime | Apple Developer Documentation",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 442702,
	"plain_text": "Hardened Runtime | Apple Developer Documentation\r\nArchived: 2026-04-05 21:18:26 UTC\r\nOverview\r\nThe Hardened Runtime, along with System Integrity Protection (SIP), protects the runtime integrity of your\r\nsoftware by preventing certain classes of exploits, like code injection, dynamically linked library (DLL) hijacking,\r\nand process memory space tampering. To enable the Hardened Runtime for your app, navigate in Xcode to your\r\ntarget’s Signing \u0026 Capabilities information and click the + button. In the window that appears, choose Hardened\r\nRuntime.\r\nThe Hardened Runtime doesn’t affect the operation of most apps, but it does disallow certain less common\r\ncapabilities, like just-in-time (JIT) compilation. If your app relies on a capability that the Hardened Runtime\r\nrestricts, add an entitlement to disable an individual protection. You add an entitlement by enabling one of the\r\nruntime exceptions or access permissions listed in Xcode. Make sure to use only the entitlements that are\r\nabsolutely necessary for your app’s functionality.\r\nhttps://developer.apple.com/documentation/security/hardened_runtime\r\nPage 1 of 2\n\nYou add entitlements only to executables. Shared libraries, frameworks, and in-process plug-ins inherit the\r\nentitlements of their host executable.\r\nDue to their privileged position in the system, macOS refuses to load system extensions that use Hardened\r\nRuntime exception entitlements. There’s one exception to this general rule: macOS allows the Allow execution\r\nof JIT-compiled code entitlement in non-DEXT system extensions.\r\nThe default value of these Boolean entitlements is false. When Xcode signs your code, it includes an entitlement\r\nonly if the value is true. If you’re manually signing code, follow this convention to ensure maximum\r\ncompatibility. Don’t include an entitlement if the value is false.\r\nSource: https://developer.apple.com/documentation/security/hardened_runtime\r\nhttps://developer.apple.com/documentation/security/hardened_runtime\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://developer.apple.com/documentation/security/hardened_runtime"
	],
	"report_names": [
		"hardened_runtime"
	],
	"threat_actors": [],
	"ts_created_at": 1775434591,
	"ts_updated_at": 1775826683,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/580a6bb518f5ae5a1de91bb70ef6172ab066ef4e.pdf",
		"text": "https://archive.orkl.eu/580a6bb518f5ae5a1de91bb70ef6172ab066ef4e.txt",
		"img": "https://archive.orkl.eu/580a6bb518f5ae5a1de91bb70ef6172ab066ef4e.jpg"
	}
}