Skip to main content
Protect My Mac — FreeNo credit card required

Input Monitoring (Input Monitoring) is a macOS privacy permission. Input Monitoring allows an app to monitor all keyboard and mouse input across your entire Mac, regardless of which app is in the foreground. This means the app can see every keystroke you type — including passwords, credit card numbers, and private messages. Common apps that request this permission include Karabiner-Elements, BetterTouchTool, Logi Options+, Elgato Stream Deck, Synergy. Risk level: danger. To check which apps have this permission, open System Settings, go to Privacy & Security, and select Input Monitoring. CoreLock scans for all apps with Input Monitoring access and flags any that also have network access — a red flag for potential keyloggers that capture and exfiltrate your keystrokes. It monitors for newly added Input Monitoring permissions and alerts you immediately.

Security/Permissions

Input Monitoring on Mac

DangerHigh risk — grants deep access to your system or sensitive data

Input Monitoring allows an app to monitor all keyboard and mouse input across your entire Mac, regardless of which app is in the foreground. This means the app can see every keystroke you type — including passwords, credit card numbers, and private messages.

Apps That Commonly Request This

Karabiner-Elements
BetterTouchTool
Logi Options+
Elgato Stream Deck
Synergy

Privacy Risks

  • The app can log every keystroke you type, including passwords, credit card numbers, and personal messages
  • Mouse and trackpad movements can be tracked to build a profile of your behavior and app usage
  • Keyloggers specifically target this permission to capture credentials and sensitive data
  • Input data can be silently transmitted to remote servers without your knowledge

How to Check Input Monitoring on Your Mac

1

Open System Settings

Click the Apple menu and select System Settings.

2

Navigate to Privacy & Security

Click Privacy & Security in the sidebar.

3

Select Input Monitoring

Click Input Monitoring. This shows apps that can see your keyboard and mouse input system-wide.

4

Keep this list minimal

Only keyboard remapping tools, custom input devices, and accessibility tools legitimately need this. If you see an app that shouldn't need to read your keystrokes, remove it immediately.

How to Revoke Input Monitoring

1

Open Input Monitoring in System Settings

Go to System Settings > Privacy & Security > Input Monitoring.

2

Disable or remove the app

Toggle off the app or select it and click the minus (-) button to remove it completely.

3

Restart the app or your Mac

Changes to Input Monitoring may require the app to be restarted, or in some cases a full system restart.

How CoreLock Helps

CoreLock scans for all apps with Input Monitoring access and flags any that also have network access — a red flag for potential keyloggers that capture and exfiltrate your keystrokes. It monitors for newly added Input Monitoring permissions and alerts you immediately.

Automatic permission scanning
Change detection alerts
Plain-English risk explanations

Frequently Asked Questions

Is Input Monitoring the same as a keylogger?

Input Monitoring provides the technical capability that keyloggers use — the ability to read every keystroke. Legitimate apps use it for keyboard remapping or custom shortcuts. Malicious apps use the same capability to steal passwords and sensitive information. The permission itself isn't malicious, but it's the highest-risk permission for credential theft.

Do I need Input Monitoring for my Logitech or Razer mouse?

Yes, if you want to use custom button mappings or gestures. Peripheral management software like Logi Options+ and Razer Synapse need Input Monitoring to detect custom button presses and remap them. If you're using the default button functions, you can safely revoke it.

How can I tell if a keylogger is installed on my Mac?

Check System Settings > Privacy & Security > Input Monitoring for any app you don't recognize. Also look in Accessibility — some keyloggers use that permission instead. CoreLock automatically flags suspicious apps with input-reading permissions and checks them against known threat databases.

Audit Your Permissions — Free

CoreLock scans every app on your Mac and shows you exactly which permissions each one has. Find hidden access in under 60 seconds.

Download CoreLock Free

Available for macOS and Windows