Simple utility used to scan a directory for possibly dylib hijacks.
$ pip install -r requirements.txt
$ python scan.py
Usage: python scan.py <directory>
Example usage:
$ python scan.py "/Library/Application Support/"
Output is simply a pretty print of a dict containing the vulnerable file and the libraries that may be susceptible to hijacking.
This tool makes no guarantees in terms of accuracy of results. It makes no attempt to check permissions or other such mitigations of the vulnerabilities.
While this tool was created for use in a couple of independent projects, it was inspired by Patrick Wardle's scanner of the same nature -- DHS.app. His tooling is much more sophisticated and thorough, but didn't meet my use case.