Reference · 4 min read

System requirements

Noxen runs on Apple Silicon and Intel Macs with macOS 14+. The iOS companion is view-only and runs on iOS 17+. Network requirements are SSH outbound to your hosts and HTTPS outbound to feed.noxen.app — nothing inbound, no agent installed on remote hosts.

macOS app

RequirementDetail
macOS version14.0 (Sonoma) or later — including 14, 15, 26
ArchitectureApple Silicon (M1/M2/M3/M4) — universal binary, also runs natively on Intel
RAM4 GB minimum; 8 GB recommended for fleets > 100 hosts
Disk~150 MB for the app; ~100 MB for the CVE feed; ~500 MB working set during SQLite import on large fleets
DistributionDeveloper ID + Sparkle (auto-update). Not on the Mac App Store — see why we ship via Developer ID.

iOS companion

RequirementDetail
iOS version17.0 or later (incl. iOS 26)
DevicesiPhone, iPad — universal binary
CapabilitiesView-only. No scanning logic on iOS — raw sockets are blocked. All scanning runs on the Mac.
SyncSame iCloud account as the Mac (private CloudKit container iCloud.com.paulsnyman.noxen)
Push notificationsOptional — APNs delivery for critical findings discovered by scheduled scans

App Sandbox is intentionally disabled

Noxen does not ship with App Sandbox enabled (ENABLE_APP_SANDBOX: false in the project config). Two reasons:

The trade-off: Noxen ships via Developer ID with Sparkle for updates, not the Mac App Store. We notarise every release. Full reasoning →

Permissions Noxen requests

Network requirements (outbound)

DestinationWhyFrequency
feed.noxen.app:443Signed CVE feed manifest + snapshotOnce per UTC-day on Live Feed; per-release on Noxen 1.x
noxen.app/appcast.xml:443Sparkle update checkPer launch (cached 24 h)
your hosts:22 (or custom)SSH inventory + scan probesPer scan
your hosts:<port>TCP / HTTP / TLS probesPer scan, only on open ports
Webhook URLs (Slack/Discord/Teams/custom)Critical-finding alertsPer new finding ≥ minimum severity

Remote host requirements

Supported distros for CVE matching

Out of the box: Ubuntu (LTS lines), Debian, Rocky Linux, AlmaLinux. Other distros can still be enrolled and scanned for network exposures (port scan, TLS, HTTP headers, admin surfaces) — only the CVE-vs-package match is distro-gated. OpenSUSE, Alpine, and FreeBSD support is on the roadmap.