AI agents: see /llms.txt for a full index of this site, or /llms-full.txt for concatenated documentation.

Back
Credential ProtectionMultipleUpdated Dec 9, 2025

Protect Keychain Databases

Audit Keychain database access and block dscl from dumping password hashes, stopping infostealers like Atomic Stealer from harvesting macOS credentials.

Idea

macOS Keychain stores sensitive credentials including passwords, certificates, and encryption keys. Infostealers like Atomic Stealer bypass Keychain access controls by copying the database files to an unprotected location. This cookbook entry provides both monitoring (FAA audit) and blocking (CEL for dscl) approaches.

Solutions

File AccessMonitor Keychain Access
Audit all access to Keychain database files
Path Prefixes
Options
Allow Read Access:
Audit Only:
Rule Type:
Processes
  • Signing ID:
  • Signing ID:
  • Signing ID:
  • Signing ID:
  • Signing ID:
  • Signing ID:
Custom Message
ExecutionBlock Password Hash Dumping
Prevent dscl from reading password hash data
Signing ID
CEL Expression
Custom Message

Mitre Attack

Tags

keychainpasswordscredentialsdsclinfostealer

Deployment Notes

Deploy the FAA audit rule first to understand which processes legitimately access Keychain files in your environment. The dscl blocking rule is safe to deploy widely.

Related Rules