Skip to main content
macOS support is implemented and functional. This page documents known limitations and areas needing more testing.

How macOS Differs from Linux

FeatureLinuxmacOS
Capture methodeBPF (kernel)Network Extension (user space)
TLS decryptionuprobes on OpenSSLTLS MITM proxy
PrivilegesCAP_BPFSystem Extension approval
SigningNone requiredApple Developer ID
InstallationDownload binarySigned app + user approval

Known Limitations

CA Certificate Trust

Users must manually trust the OISP CA certificate in Keychain. Some applications (especially browsers) may show certificate warnings until:
  1. The CA is properly installed to System Keychain
  2. The application is restarted after trusting

Application Compatibility

Some applications may not work with TLS MITM:
Application TypeStatusNotes
Most apps✅ WorksStandard TLS works fine
Certificate pinning⚠️ LimitedApps with cert pinning may fail
Custom TLS⚠️ LimitedNon-standard TLS implementations

Performance

  • First connection to each domain has slight latency (certificate generation)
  • Very high-throughput applications may see minor slowdown

What Needs Testing

We’re actively seeking feedback on:
  • Long-running stability — Does it work reliably for hours/days?
  • Different AI SDKs — Python, Node.js, curl, etc.
  • Edge cases — Streaming, large responses, concurrent requests
  • Memory usage — Under sustained load

Workarounds

Certificate Issues

If you see certificate errors:
  1. Re-install CA via menu bar → “Install CA Certificate”
  2. Restart the affected application
  3. Check Keychain Access → ensure OISP CA is “Always Trust”

Extension Issues

If traffic isn’t being captured:
  1. Check System Settings → Privacy & Security → Network Extensions
  2. Ensure OISP extension is enabled
  3. Try restarting the app

Reporting Issues

If you encounter problems:
  1. Run with debug: RUST_LOG=debug /path/to/oisp-sensor
  2. Note the macOS version and affected application
  3. File an issue on GitHub with logs

Next Steps