I’m trying to install an app on my Mac and I keep getting a warning that says Apple could not verify it is free of malware, so the installation is blocked. I’m not sure if it’s actually dangerous or just from an unidentified developer. How can I safely check if the app is legitimate and bypass this message if it’s safe, without putting my Mac at risk?
That message comes from Gatekeeper and Notarization in macOS. It means macOS does not trust the app for one of a few reasons:
Typical causes
-
The app is from an unidentified developer
- Developer did not sign it with an Apple Developer ID.
- Often happens with hobby tools, old apps, or stuff from small vendors.
-
The app is not notarized
- Since macOS Catalina, Apple wants apps notarized.
- Notarization means the developer uploads the app to Apple.
- Apple scans it for known malware.
- If that step did not happen, you get that warning.
-
The app was modified after signing
- If something changed any file inside the app bundle, the signature breaks.
- That can happen from corruption, a bad download, or tampering.
-
The download is damaged or incomplete
- Interrupted download, wrong version, or some disk error.
How to check if it is safe
-
Check the source
- Download only from the developer’s site or the Mac App Store.
- Avoid random mirrors and third party download sites.
-
Check the developer
- Is the company known.
- Does the site use HTTPS.
- Does the version match what the site lists.
-
Verify the file
- Right click the app, choose Get Info.
- Under “Kind” and “Developer”, see if the developer name looks legit.
- If there is no developer there, it is unsigned.
-
Scan it
- Use a reputable antivirus on macOS.
- VirusBarrier, Malwarebytes, or equivalent.
- Upload the file’s checksum or, if small, the file itself to VirusTotal.
How to open it anyway if you decide to trust it
- Control click the app and choose “Open”.
- A different dialog appears with an “Open” button.
- Click “Open” to run it.
- This whitelists it for future launches.
Or through System Settings
- Try opening the app once so the warning appears.
- Open System Settings, then Privacy & Security.
- Scroll down to “Security” section.
- You should see “App was blocked from use”.
- Click “Open anyway”, then confirm.
When you should stop and delete it
- The app asks for admin password for no clear reason.
- It wants to install “helpers” or “profiles” that you did not ask for.
- It came from a random forum link or some “free cracked” site.
- Your gut says it looks shady, terrible UI, weird installer, no docs, no company info.
My personal rule
- If it is not notarized and not from a vendor I trust, I bin it.
- If it is from a respected dev known in the Mac world but older, I might allow it after scanning.
- For work machines or anything with sensitive data, I stick to notarized and signed apps only.
So the warning by itself does not prove malware. It means macOS has not verified it. Treat that as a risk flag, then decide based on source, developer reputation, and your own threat level.
Apple’s wording here is honestly terrible. “Could not verify it is free of malware” sounds like “this app IS malware,” when in reality it mostly means “this app failed Apple’s trust checks, so we’re blocking it by default.”
@viajantedoceu already covered Gatekeeper / notarization really well, so I’ll skip repeating the same checklist and come at it from a slightly different angle: risk management and context.
1. What the message actually implies (in practice)
From what I’ve seen, this pops up in a few common scenarios:
- Older legit apps that predate notarization
- Niche / open source tools distributed as bare .app or .dmg
- Stuff that’s been repackaged (sometimes by third‑party download sites)
- Truly shady junk like “cracked” apps and aggressive adware installers
Apple isn’t telling you “we found malware.” It’s telling you “this app is outside our safety net, so if you run it, that’s on you.” Slightly different.
2. The one question that usually decides it
Where did you get the app?
- Directly from the official developer site or GitHub → possibly fine, especially if the developer is known, but they may just not have paid Apple’s yearly fee or dealt with notarization.
- Some random “download center” / “free .dmg” site / pirated copy → treat this message as a giant red flag and walk away.
Personally, I disagree a bit with the idea that you always need antivirus and VirusTotal for this. Those are nice extra steps, but if the source is sketchy, you’re already past the point where tools will reliably save you. The safest move in that case is: delete the app and find a trusted alternative.
3. When I do override the warning
In my own use, I’ll only override if all of these are true:
- I specifically went looking for that app, not the other way around
- It came from the developer’s own site or their official GitHub
- The app is well known or has a long‑standing reputation in the Mac community
- It does not try to install weird “helper” packages, profiles, or browser extensions during setup
Anything that asks for admin rights plus wants to install background “cleaners,” VPNs, or “speed boosters” is instant trash can material for me.
4. Why Apple blocks it instead of just “warning more gently”
People frequently just click “OK / Next / Allow” on anything. If Apple simply said “are you sure?” a lot of folks would blindly approve malware. By hard blocking it, they force you to:
- either explicitly bypass Gatekeeper (which takes intention)
- or re‑think if you actually trust that software
It’s annoying, but it prevents a lot of drive‑by infections from shady “free” utilities.
5. What you should do next, concretely
Instead of re‑running the same installer over and over, I’d:
- Double check the site you downloaded from. If it’s not the official homepage or project page, stop right there.
- See if the developer offers a notarized or App Store version. Many do, but users land on old mirrors via search.
- If you really need that exact app and it’s from a legit but small dev, consider writing them to ask why it’s not notarized. Sometimes they’ll point you to a newer, signed build.
- If any part of the story feels off (pirated copy, “pro cracked edition,” random link from a forum), just delete it. No tool or clever trick compensates for a bad source.
So the warning isn’t proof of malware, but it is proof that Apple hasn’t vetted it and that something is off with the signing / distribution. Treat that as a big yellow light: you can proceed, but only if you’re very sure you know who you’re trusting and why.
Short version: that dialog is macOS saying “this app sits outside our trust system, proceed at your own risk,” not “confirmed malware.”
@shizuka and @viajantedoceu covered the mechanics (Gatekeeper, signatures, notarization) really solidly. Instead of repeating that, here’s how I’d decide what to do, in practical terms.
1. Focus less on the pop‑up, more on the scenario
Ask yourself:
- Did you go looking for this specific app, or did some site tell you “you must install this to continue”?
- Is it from an obvious place (developer’s own site, official GitHub, or the Mac App Store), or a generic download portal, “crack” site, or ad?
If it is the second case in either bullet, treat the warning as a stop sign, not a speed bump. Delete it.
I actually disagree a bit with relying heavily on antivirus first. If the source is a pirated / shady site, you are already in the danger zone. A clean scan does not undo that risk.
2. Think about what the app wants to do
Before bypassing Gatekeeper, figure out what level of power the app will need:
- Needs full disk access, kernel extensions, VPN configuration, browser extensions, or configuration profiles?
- Promises “system cleaning,” “boosting,” “free movies,” or “cracks”?
Combine that with Apple’s “could not verify” warning and the answer is: uninstall and move on. Plenty of legit apps are not notarized, but almost no good reason exists anymore for a random “optimizer” to be both unsigned and invasive.
For simple utilities (single .app, no installer, no kexts), from a legit developer’s official site, I’m more open to bypassing after checking their reputation.
3. Practical risk tiers
Think in tiers instead of yes/no:
-
Zero tolerance
- Work laptop
- Machine with client data, company VPN, or sensitive files
- Here, if it is not signed and notarized, I treat the warning as final. Find an alternative.
-
Cautious
- Personal Mac, but used for banking, password manager, etc.
- I only bypass for well known projects or developers, and only if I fetched it from their official channel.
-
Lab / test machine
- Non‑critical Mac you can erase easily
- This is where I’ll experiment with weird hobby tools, still with some sanity checks.
You did not mention what kind of Mac this is. That context matters more than the exact text in the popup.
4. Why old or niche apps often hit this wall
Some small developers:
- Do not want to pay Apple’s yearly developer fee
- Are building open source tools where notarization is just extra work
- Maintain old but beloved apps that stopped before the notarization era
These are not automatically suspect. Open source command line tools and retro utilities often trigger Gatekeeper even when they are perfectly fine. That is where reputation and community trust come in.
If people you trust in the Mac world suggest that app, or it has a long history and active issues / releases, that is different from “some random DMG from a ‘free download’ site.”
5. When I personally do not override the warning
Even if others might:
- The app is a commercial product, yet not signed or notarized in 2026. That is sloppy at best. I usually skip it.
- The installer bundles “extras,” toolbars, cleaners, or VPNs. Auto‑reject.
- The developer has no identifiable info. No company, no real‑world contact, only a sketchy landing page.
This is where I am stricter than many people. If a dev expects money or deep system access, they can meet Apple’s basic requirements.
6. About “”: pros & cons in this context
Since you mentioned the product title “”, I’ll frame it generically as if you are evaluating an app like that against this warning.
Pros if you decide to keep using something like “”:
- Might offer exactly the niche feature you need that big-name apps do not have
- Smaller tools are often lighter, faster, and less bloated
- If it is from a known indie dev, you sometimes get better, more direct support
Cons:
- If it is not properly signed / notarized, you will keep hitting Gatekeeper friction
- Higher risk of sudden incompatibility with future macOS versions
- Security posture depends heavily on a small team or single developer
- You shoulder more of the risk, since Apple’s automated checks are not in the loop
So a “”-style app can be great, but if it triggers exactly the message you are seeing and the dev has not fixed that in 2026, it is a mark against it compared to alternatives.
7. Comparing perspectives
- @shizuka gives a more structured, step‑by‑step safety workflow, which is excellent if you want a checklist.
- @viajantedoceu leans into risk management and source‑based judgment, which I strongly agree with, though I would personally be even less forgiving with unsigned commercial apps.
If the app is not critical, the simplest and safest choice is: delete it and search specifically for a notarized alternative that does the same job. The time you spend trying to justify bypassing this message is rarely worth the security trade‑off unless this tool is truly unique and trusted by a community you already know.