Maxx keeps every app on your Mac current, verified, and auditable.
Where competitors stop at detection, Maxx acts.
curl -sSL https://fixxr.org/install.sh | bash
copy
MacUpdater's backend went dark. 238 apps lost their update path overnight. Homebrew covers some. The App Store covers others. The rest drift — quietly accumulating security debt — until a CVE shows up and you realise you've been running a vulnerable version for four months.
Apps outside Homebrew or the MAS have no automatic update path. They fall behind silently.
You can't tell if a "Chrome update" is actually Chrome. TeamID verification closes that gap.
When did that app update? From where? What changed? Without provenance, you're guessing.
Every update Maxx installs passes through the same four-step protocol. No shortcuts. No blind trust. The protocol is open source — you can read every line.
Maxx queries Sparkle feeds, Homebrew Cask, and the Mac App Store. He finds what's new across all four update mechanisms so nothing slips through.
TeamID from codesign -dvv is compared against the installed app. New TeamID = blocked. The community catalog adds consensus sha256 verification.
Before any rights elevation: CDN origin, URL patterns, and an optional Claude Haiku second opinion. High confidence installs automatically. Low confidence queues for your review.
Every update — success or failure — is committed to a local Dolt database. Who, what, from where, when. You own the full provenance trail. Nothing leaves without your consent.
Maxx routes each app to the best available mechanism automatically. Homebrew Cask, MAS, Sparkle, native triggers — all unified under one protocol.
Maxx queries every source in parallel. No manual configuration — he reads your installed apps and figures out where they update from.
fixxr scanDays outdated × security tier. A browser 47 days behind ranks above a utility that just hit a minor version.
fixxr list --riskAI assessment runs before every rights elevation. Suspicious installs queue for your review. Everything else completes automatically.
fixxr updateWhere did this binary come from? What CDN? Was the TeamID consistent? SHA256 consensus from the community catalog?
fixxr provenanceTotal apps tracked, outdated count, CVE exposure, mean days outdated, pending safety reviews — in a single report.
fixxr reportNot a checkmark. An actual stamp — the visual payoff for the whole provenance system. When Maxx earns it, he puts his mark on the work.
TeamID chain unbroken. The new binary's signing identity matches the installed app. Same developer, verifiably.
SHA256 matches community consensus. Other FIXXR users saw the same binary. Or self-verified on first download and cached locally.
CDN domain consistent. Mozilla doesn't suddenly update from a domain in Russia. Google doesn't deliver Chrome from a sketchy CDN. Drift is caught.
The library is in order. Every tool verified and in its place.
Depth is unlocked, not forced. A personal Mac user gets visibility and hygiene. A security engineer gets provenance and intelligence. Same Maxx, same protocol.
Know what's installed, what's outdated, and how far behind. The baseline every Mac user should have.
Actually install the updates. Maxx routes to the right mechanism. Brew, MAS, Sparkle — all in one command.
Know where every binary came from. TeamID verification, SHA256, CDN tracking, the Green Seal.
CVE correlation. Risk-ranked updates. AI safety gatekeeper. Community checksum consensus. The full platform.
The FIXXR community catalog lives on DoltHub — a version-controlled, open dataset of verified app provenance. Every participant makes the catalog smarter for everyone who follows.
A version-controlled SQL database of macOS app provenance: download URLs, TeamIDs, SHA256 checksums, update mechanisms. Opt-in push contributes your verified data. Pull merges community improvements into your local catalog. Dolt's 3-way merge handles conflicts. Privacy filter enforced in code — only whitelisted fields ever leave your machine.
For the ~53 third-party apps with no automation record, you can help Maxx learn.
Run fixxr watch "App Name" while manually updating an app — Maxx monitors network connections, detects the CDN and download pattern, and records the mechanism.
Opt-in with fixxr community enable --help-maxx to share what you discover.
Your observation becomes the next person's automation.
When multiple FIXXR users download the same version of the same app, their SHA256 hashes should match. A mismatch is a supply chain incident. The catalog tracks consensus — if your hash diverges from 47 other endpoints, you'll know. Architecture differences (arm64 vs universal) are annotated to avoid false alerts.
Maxx queries OSV.dev for known vulnerabilities in every installed app version, cached locally in Dolt to avoid repeated API calls.
Run fixxr cve to scan your full inventory. Results surface in fixxr report and fixxr list --risk — CVE exposure moves an app up the priority queue automatically.
A Verein is a Swiss non-profit association — the governance structure for projects that belong to a community, not a company. The FIXXR Verein is the entity being formed to steward the protocol, the catalog, and the open-source codebase over the long term.
Any individual or organisation can become a member. Governance is democratic. No single entity controls the protocol.
The Verein's accounts, decisions, and membership are public. Inspired by Objective Development's IAP model — declare what you do and be held to it.
The Verein maintains the FIXXR Protocol specification, the community catalog on DoltHub, and the domain fixxr.org.
Membership dues fund infrastructure (DoltHub, hosting, CI). The software stays MIT-licensed, free to use, fork, and self-host.
The library belongs to everyone who tends it.
Inspired by Objective Development's Internet Access Policy model.
Maxx declares exactly what data exists locally, what you can share, and what never leaves your machine.
Run fixxr privacy --audit to see the actual stored data alongside the policy.
fixxr watchcurl -sSL https://fixxr.org/install.sh | bash
copy
macOS 13 Ventura or later · Apple Silicon and Intel supported · Python 3.11+ (via Homebrew)
Dolt installed automatically · No pip dependencies in the core platform
Read the README first if you prefer to review before running install scripts.
The installer source is at fixxr.org/install.sh and in the GitHub repo.