I'm developing a custom library that is loaded in a third-party software.
The library is being built using CMake, and then signed using the codesign tool with a "Developer ID Application" certificate.
The signing process works just fine, and I get the following output when I check for the correct signature:
xxxxx@MacBook-Pro-JS Downloads % codesign -dv --verbose xxxxxx.so
Executable=/Users/xxxxxx/Downloads/xxxxxx.so
Identifier=xxxxxx
Format=Mach-O thin (x86_64)
CodeDirectory v=20400 size=8115 flags=0x0(none) hashes=248+2 location=embedded
Signature size=8967
Authority=Developer ID Application: Binho LLC (VG9F9RW797)
Authority=Developer ID Certification Authority
Authority=Apple Root CA
Timestamp=30 Sep 2022 at 17:56:49
Info.plist=not bound
TeamIdentifier=VG9F9RW797
Sealed Resources=none
Internal requirements count=1 size=176
I can also verify the signature with the following command:
xxxxxx@MacBook-Pro-JS Downloads % codesign --verify --verbose xxxxxx.so
xxxxxx.so: valid on disk
xxxxxx.so: satisfies its Designated Requirement
However, when I load it in the third-party software, I get the following OS prompt:
"xxxxxx.so" can't be opened because Apple cannot check it for malicious software.
This software needs to be updated. Contact the developer for more information.
Note: the warning only shows on some systems, and not on others.
Am I missing any step to avoid Apple from identifying my library as malicious software?
Thanks in advance.