What the macOS pasteboard actually is
The thing you call "the clipboard" on a Mac is, technically, an instance of NSPasteboard. The general one — NSPasteboard.general — is the system-wide service that backs Cmd-C, Cmd-V, the Edit menu, and every drag-and-drop you have ever done on the desktop. It is not an app feature. It is an operating-system feature exposed to every running process.
What lives on it is more than text. A single copy can carry a half-dozen representations of the same content at the same time: a UTF-8 plain string under public.utf8-plain-text, a styled public.rtf blob that preserves bold and italics, a public.html rendering, file URLs (public.file-url) for the items you dragged out of Finder, and image data when you take a screenshot with the clipboard option held. The receiving app picks whichever flavor it prefers. That is why pasting from Safari into Mail keeps your formatting and pasting into Terminal silently strips it.
Everything on the pasteboard is keyed by what Apple calls a change count. Every time something new gets copied, the count increments by one. Apps poll that integer to decide whether to read again. There is no permission gate, no broker, no audit log. If your app is running, it sees the change count, and if it asks for the data, it gets the data. The pasteboard is closer to a global variable than to a guarded resource.
The most useful mental model: the macOS pasteboard is a single, mutable, shared dictionary keyed by content type. Every app on your machine has read access. Most of them have it without you ever granting it.
By default, macOS keeps exactly one item there at a time. Copy something new and the previous value is overwritten. There is no built-in scrollback you can reach through Finder or System Settings. That sounds reassuring, but it is only the surface. Every clipboard manager you have ever installed extends that single slot into a persistent on-disk history, and Universal Clipboard quietly synchronizes the live slot to every other Apple device on your account.
Universal Clipboard: the cross-device leak path
Universal Clipboard is the feature that lets you copy a paragraph on your Mac and paste it into Notes on your iPhone a second later. It rides on top of Continuity and Handoff, the same plumbing that hands you a phone call from your iPhone or a tab from your iPad. The transport is encrypted in flight: a short Bluetooth Low Energy advertisement announces that something is on offer, and the actual payload moves over a peer-to-peer Wi-Fi link.
The encryption is real, but it solves a narrow problem. It protects the bytes from somebody sniffing the air between your laptop and your phone. It does not protect you from anything happening on either end. The trust model assumes that every device signed in to your Apple ID is trusted equally. The clipboard you just copied on your Mac is offered, in cleartext, to every device on that account that is awake and within range.
Family Apple ID
Households that share an Apple ID for App Store purchases unintentionally share a clipboard. Copy a 2FA recovery code on the work Mac, and the family iPad sees it.
Old devices on shelves
An iPad in a drawer that still wakes for notifications can briefly receive Universal Clipboard payloads if it is on the same Apple ID and within range.
Loaner Macs
If you signed in to your Apple ID on a borrowed device for any reason, your clipboard reached that machine for as long as Continuity was active.
Shared screens
An iPhone connected to CarPlay or AirPlay does not pull pasteboard contents itself, but the receiving Apple device on the same ID still does.
The receiving device's storage of the value is short-lived — the system holds the most recent payload only until the next copy replaces it. But "short-lived" is doing a lot of work here. Anything on a clipboard for a few seconds is long enough to be read by an app that is polling, snapshotted by an automation tool, or referenced from a notification preview. Treat Universal Clipboard the way you would treat an unencrypted Slack DM to yourself: convenient, plausible, not where you want to put a credential.
Apps that read your clipboard without asking
In 2020, iOS 14 introduced a small but consequential UI change: a banner along the top of the screen that read "TikTok pasted from Notes," "LinkedIn pasted from Safari," and so on. Suddenly visible, the practice of polling the clipboard turned out to be widespread, including among apps that had no reason to. iOS made the implicit explicit, and the resulting backlash forced many apps to scale it back.
macOS has no equivalent banner. There is no system-level toast when an app reads NSPasteboard.general, no consent prompt the first time it does, no entry in System Settings that says "the following apps have read your clipboard in the last hour." Any Cocoa app that is running and that calls string(forType: .string) gets the contents. If the app is also using a timer to do so — a common pattern for "smart paste" features that want to detect a freshly copied URL — it sees every copy you make as long as the app is alive.
Browser extensions
The JavaScript Clipboard API in modern browsers is permissioned: a site has to ask before it can read. Browser extensions are a different story. Once you approve "read and change all your data on websites," the extension can read the clipboard the moment a page is focused. Shopping coupon helpers, AI assistants, password autofillers, and translation tools all routinely use this access.
Polling utilities
Quick-launch tools, screenshot annotators, color pickers, and link unfurlers commonly poll the pasteboard a few times a second. The intention is benign — they want to be useful the moment you copy something — but the practical effect is the same as a quiet keylogger for clipboard contents.
Third-party menu bar apps
Anything that lives in the menu bar with a status item is a long-running process. If even one of those apps reads the pasteboard on a timer, your clipboard activity is visible to whatever process owns the binary.
Remote desktop and screen-share helpers
Software that synchronizes your clipboard to a remote VM or to a colleague's screen-share session is, by definition, exfiltrating clipboard contents. That is the feature. The risk is forgetting the sync is on after the session ends.
The unsettling part is that none of this requires malware. Every app named above is doing exactly what its developers intended, on a platform that does not require them to declare it. The only practical way to know which apps on your Mac currently read the pasteboard is to read their privacy policies, watch Activity Monitor, or assume the worst and design your workflow around it.
How third-party clipboard managers store history
Once you install a clipboard manager — anything that turns the single-slot pasteboard into a scrollable list — you have crossed a line that is easy to forget. Every copy you have made for the last day, week, or month is now persisted to disk. Where, in what format, and with what protection depends entirely on which manager you chose. The list below is a survey of the popular ones, with what is publicly known about how each handles your history. Treat it as a starting point for your own audit, not a security review.
| Manager |
Where it stores history |
What to watch out for |
| Maccy |
Local Core Data store under ~/Library/Application Support/Maccy/, backed by SQLite. Plain text by default. |
Open source and audit-friendly. Configurable filters can suppress sensitive items, but the database itself is not encrypted at rest, so a stolen disk image is a clipboard dump. |
| Paste |
Local store with iCloud sync via CloudKit. History propagates to every device signed in to the same iCloud account. |
The sync convenience is the privacy trade. Restoring a device from iCloud restores clipboard history. If your iCloud account is compromised, so is your scrollback. |
| Alfred clipboard |
Local property list and SQLite under Alfred's preferences directory. Configurable retention from 24 hours to 3 months. |
Powerpack feature; off by default. Honors a per-app ignore list and supports password-manager-style auto-clear, which is unusually thoughtful for the category. |
| Raycast clipboard |
Local SQLite database. Recent versions added shape-based filters that try to keep secrets out of history. |
The secret filtering is a step forward but is heuristic. Anything the heuristic misses lands in the same database. Raycast Pro adds optional cloud sync, which moves the trust boundary outward. |
| CopyClip and similar lightweights |
Small local property list of recent items, typically capped at a few dozen entries. |
Simpler, smaller surface, but no encryption and rarely any concept of secret-aware filtering. The whole list is plain text by design. |
The honest takeaway: the popular managers are mostly good citizens. None of them is shipping your clipboard to an adversary. The risk is not malice; it is the cumulative effect of running a polling reader for years and leaving the resulting log on disk. A clipboard manager is an excellent productivity tool and an excellent dossier of everything you have copied since the day you installed it. Both things are true at the same time.
Auditing what's leaked: a 5-step check
Block out twenty minutes on a quiet Sunday. The five steps below cost almost nothing to run, and the results will tell you more about your clipboard hygiene than any blog post can. Run them in order. Treat anything that surprises you as a finding worth following up on.
Inventory your clipboard storage
Start with a single find under your home Library to list anything that looks like clipboard data.
find ~/Library/Application\ Support \
-iname "*clip*" -o -iname "*paste*" 2>/dev/null
Expect a handful of directories: any clipboard manager you have installed, plus a few benign hits from apps that happen to use the words. The point is to see the full set in one place, not just the one you think you remember installing.
Peek inside any SQLite databases you found
Most of those directories will contain a .sqlite file. Open it read-only and dump the recent rows. Read-only matters: you do not want to alter the database while the manager has it open.
sqlite3 -readonly \
~/Library/Application\ Support/Maccy/Maccy.sqlite \
".tables" ".schema HistoryItem" \
"SELECT firstCopiedAt, lastCopiedAt, content FROM HistoryItem \
ORDER BY lastCopiedAt DESC LIMIT 20;"
Adjust paths and table names per manager. The goal is to confirm with your own eyes what shape the storage takes and how far back it goes. If you see a token or a password in the output, treat it as if it had leaked — because for the purpose of disk-level threat models, it has.
Check what is talking to the pasteboard right now
Activity Monitor's CPU tab plus a quick look at the system pboard process gives you a rough sense of who is reading. Sort by name and look for the pboard daemon and any process whose CPU spikes shortly after every copy.
ps aux | grep -i pboard
log show --last 5m --predicate \
'subsystem == "com.apple.pasteboard"' --info
The unified log will not tell you the contents, but it will tell you which apps interacted with the pasteboard in the recent past. Anything you do not recognize is worth investigating.
Audit your iCloud and Universal Clipboard surface
Open System Settings, click your name at the top, and review which devices are listed under your Apple ID. Each one is a potential receiver of Universal Clipboard payloads. Sign out of any device you no longer use. Under General → AirDrop & Handoff, the toggle for "Allow Handoff between this Mac and your iCloud devices" controls Universal Clipboard. Decide deliberately whether you want it on.
defaults read com.apple.coreservices.useractivityd \
ActivityAdvertisingAllowed
defaults read MobileMeAccounts
Those reads are illustrative — they show you what state your machine is in without changing anything. Recent macOS versions also expose pasteboard-related transparency under Settings → Privacy & Security. Take a minute to look at every entry there.
Review which apps have privileged input access
Many clipboard tools and global hotkey managers ask for Accessibility or Input Monitoring permissions. Those permissions are far broader than the clipboard, so the list is a good proxy for "apps with deep observational access to my Mac." Settings → Privacy & Security → Accessibility, then the same path for Input Monitoring and Screen Recording. Revoke anything you cannot account for, then restart and confirm nothing you actually use breaks.
If your audit turns up nothing alarming, you have a baseline and a procedure to repeat next quarter. If it turns up something — an old database with a 90-day history, a stale Apple ID device receiving Universal Clipboard, a forgotten extension polling on every page load — you have learned something the operating system was never going to volunteer.
The local-only fix
The reason the audit above is necessary is that almost every clipboard manager is optimized for convenience first and privacy second. That is not a moral failure — it is a product decision that suits most users. But if you are the kind of person who runs the audit, you probably want a different default. The shape of the tool you are looking for is consistent across every threat model worth taking seriously.
No cloud sync, or sync default-off
The simplest possible privacy story is the one where the data never leaves your machine. If a manager offers cloud sync, it should be opt-in, off by default, and clearly disclosed in the settings the first time you launch.
Encrypted storage at rest
An on-disk history that is plaintext SQLite is a single backup or stolen device away from being a credential dump. Encryption at rest, ideally tied to a key that is never written to disk in cleartext, turns that risk back into a normal disk-encryption story.
Secret-aware classification with a memory-only TTL
The clipboard has to know the difference between "the path I just yanked" and "an API token." When a value looks like a secret, the manager should keep it out of the persistent history entirely, holding it only in memory and only for as long as you need to paste it once.
Transparent storage path
You should be able to tell, in one sentence, where the manager keeps your history. If the answer requires reading the source code or a privacy policy, the trust model is already wrong.
Configurable retention
"Keep everything forever" is the wrong default. A clipboard manager you trust will let you cap retention at a number of items or a number of days, and will round-trip that setting to the actual database.
No telemetry, no account, no analytics
The manager should not phone home. Not for crash reports, not for usage analytics, not for "improving the product." If it cannot work fully offline, it is not local-only.
One example of a tool built around exactly that checklist is ClipGate. It runs entirely on the local machine, encrypts the on-disk vault at rest, classifies secret-shaped items into a separate quarantine instead of the default scrollback, and ships without an account or telemetry. It is one of several reasonable answers — the principles above matter more than the specific binary you choose. If you want the design notes and configuration surface, the documentation covers both, and the browser extension page describes how the same secret-aware capture is extended into the browser. Whatever tool you land on, run the audit again a month later. The point is the habit, not the brand.
Frequently asked questions
Does macOS keep a clipboard history by default?
Out of the box, macOS only retains the most recent item on NSPasteboard.general. There is no built-in scrollable history. However, every running app can read that current value silently, and any installed clipboard manager you have added to your machine almost certainly maintains its own on-disk history database that survives restarts.
Can other apps read my clipboard on macOS without asking?
Yes. Unlike iOS, which surfaces a banner when an app reads the pasteboard, macOS does not prompt or notify. Any active app calling NSPasteboard.general can read the current contents, and many do so on a polling timer to detect new copies. Browser extensions get the same access through the JavaScript clipboard API once granted.
Is Universal Clipboard secure?
The transport between Apple devices is encrypted, but the model assumes every device on your Apple ID is trusted. A clipboard you copy on your Mac becomes immediately readable on any iPhone, iPad, or other Mac signed in to that Apple ID. If you share an Apple ID with family or another household device, your clipboard is shared too.
Where do clipboard managers like Maccy or Paste store my history?
Most local managers keep an SQLite or property list database under ~/Library/Application Support, typically as plain text. Cloud-syncing managers like Paste push the history to iCloud via CloudKit, which means restoring the device also restores the history.
How can I audit what a clipboard manager has on me?
Run a find under ~/Library/Application Support for filenames containing "clip" or "paste", open any SQLite database in read-only mode, and inspect the most recent rows. Watch Activity Monitor for processes named pboard or that frequently access NSPasteboard. Combine this with a review of which apps you have granted Accessibility or Input Monitoring permissions in System Settings.
I think I already pasted something I shouldn't have. What now?
Audit afterwards is useful, but the more urgent task is rotation. The companion piece "I accidentally pasted a password or API key" is a calm, step-by-step recovery playbook for that exact moment.
If you'd rather use a clipboard built on these principles
ClipGate is open source and local-only by default. No cloud sync, no telemetry, no account. The on-disk vault is encrypted at rest, secret-shaped values are classified out of the default scrollback, and retention is configurable. If the audit above made you want to switch, pick whichever installer fits your environment.
Site installer
Fastest path for macOS and Linux if you want the official binary with minimal setup.
curl -fsSL https://clipgate.github.io/install.sh | sh
PyPI
Useful when Python is already part of your environment, including Windows workflows.
Homebrew
Best fit for terminal-native installs if Homebrew already manages the rest of your toolchain.
brew install clipgate/tap/cg
Audit first. Switch if you want to.
The point of the audit is the habit. If you'd rather use a clipboard manager built on the local-only, encrypted, secret-aware principles described above, ClipGate is open source and runs entirely on your machine.
Read next
If your audit turned up a credential in the scrollback, this is the calm, step-by-step recovery playbook for the next sixty seconds and the next hour.
Published
~11 min read
The 2026 secret hygiene playbook for developers living inside Copilot, Cursor, and Claude Code — and why paste is the new push.
Published
~10 min read