You open 1Password, copy a login, switch to your browser, and paste. It takes two seconds. In those two seconds, every application running on your Mac — every menu bar utility, every background agent, every Electron app — had full, silent access to your password.
There is no permission prompt. No notification. No audit log. The macOS clipboard has zero access control, and that is a problem most people never think about.
macOS asks for permission before an app can access your camera, microphone, contacts, or location. But the clipboard? Any running process can call NSPasteboard.general and read whatever you last copied. Apple enforces no restrictions on this at the system level.
This isn't a theoretical concern. Clipboard-based attacks are common enough that MITRE catalogues clipboard data theft as a recognized technique in its ATT&CK framework (T1115). Real-world examples include:
These aren't exotic zero-day attacks. They exploit the simple fact that clipboard data sits in plaintext, available to anyone who asks.
1Password, Bitwarden, and Apple Passwords all copy credentials to the clipboard when you use them. Some mitigate the risk by clearing the clipboard after a timeout (usually 30–90 seconds). Some set a special macOS pasteboard attribute to signal that the content is "concealed."
But these are voluntary conventions, not OS-enforced protections:
If you use a clipboard manager alongside a password manager (and millions of Mac users do), your passwords may be sitting in an unencrypted history file on disk. Indefinitely.
With Handoff enabled, copying on your Mac can sync the clipboard to your iPhone via Universal Clipboard. On iOS, the foreground app has full clipboard access — creating an unintentional data leakage path between devices.
This is great for convenience. It's terrible for security. A password you copied on your Mac can end up readable by whatever app you happen to have open on your phone.
The solution isn't to stop using the clipboard. It's to encrypt sensitive items before they're written to disk. Here's what that looks like in practice:
Clipboard history in NotchPad — passwords are automatically encrypted and masked.
This is the approach NotchPad takes. Passwords copied from 1Password, Bitwarden, and Apple Passwords are automatically detected and encrypted with AES-256-GCM. The encryption key is stored in the macOS Keychain, and decryption requires Touch ID. You can read more about how data is handled in our privacy policy.
AES-256-GCM is the same encryption standard used by government agencies and financial institutions. The "GCM" part (Galois/Counter Mode) provides both confidentiality and integrity — meaning the data can't be read or tampered with without the key.
Compared to simpler approaches like encrypting with a user-chosen password, using the macOS Keychain + Touch ID means:
Some clipboard managers let you exclude specific apps — "don't capture anything I copy from 1Password." This is better than nothing, but it has gaps:
Auto-detection and encryption is a stronger model. It identifies sensitive content regardless of how you copied it and protects it in place rather than pretending it doesn't exist.
Here's what secure clipboard management looks like day-to-day with NotchPad:
Right-click any note to lock it with Touch ID — content is encrypted with AES-256-GCM.
No extra steps. No configuration. No cloud sync to worry about. Everything stays on your Mac, encrypted, and accessible only to you. Check the release notes for the latest improvements to sensitive data handling.
If you use a clipboard manager on your Mac — and you should, because clipboard history is genuinely useful — make sure it handles sensitive data responsibly. At minimum:
The clipboard is one of the most-used features on any computer. It's time it was one of the most protected.
Related articles
NotchPad vs Paste vs Maccy: Which Mac Clipboard Manager?
Secure Note-Taking on Mac: A Developer's Guide
Download NotchPad — Free 15-Day Trial
$9.99 one-time purchase after trial. No subscription. See pricing.