What ‘com.apple.WebKit.Networking.xpc’ Can Do (Hint: It’s Not Malware)

Mac System
Quick Fix

Download and try Outbyte MacAries right now to see what it can do for your Mac.

Developed for macOS

Special offer. See more information about Outbyte and uninstall instructions. Please review EULA and Privacy Policy.

If you’re checking your Mac computer, you might see com.apple.WebKit.Networking.xpc in your Firewall Options. It’s a legitimate service related to the WebKit framework that is responsible for rendering web pages in Safari and other browsers.

The message goes something like com.apple.WebKit.Networking.xpc Allow incoming connections.

The question is: Is this a legitimate component of your Mac system? Or is it a piece of Mac malware that hijacks browsers and seriously threatens your machine? Let’s have a look and see what com.apple.WebKit.Networking.xpc can do in this short guide.

Is com.apple.WebKit.Networking.xpc Dangerous?

The first step that you can take to figure out if com.apple.WebKit.Networking.xpc is a dangerous element is to run your anti-malware software. See if the results include this file. It is also wise to run a Mac optimizer tool that can clean out junk and other unnecessary files that get in the way of your Mac’s performance and stable operations.

Pro Tip: Scan your Mac for performance issues, junk files, harmful apps, and security threats
that can cause system issues or slow performance.

Free Scan for Mac Issues
410.674 downloads
macOS compatible

Special offer. About Outbyte, uninstall instructions, EULA, Privacy Policy.

If com.apple.WebKit.Networking.xpc doesn’t come up as a suspicious element or an outright threat, it is safe to assume that it is a legitimate or even necessary part of your system.

A GetInfo report also yields information about com.apple.WebKit.Networking.xpc. The file can be found in /System/Library/Frameworks/WebKit.framework/Versions/A/XPCServices.

The permissions are the following:

  • System – Read and write
  • Wheel – Read only
  • Everyone – Read only

From scraping the web for answers, we found that com.apple.WebKit.Networking.xpc appears to be an Apple product. It is used by programs such as Safari, Mail, Messages, App Store, iCloud, and likely others that require internet connection. This is unless, of course, if an entity spoofs information that GetInfo would report on a file.

com.apple.WebKit.Networking.xpc Pop-Up in Safari

You might also find this message while on Safari: com.apple.WebKit.Networking.xpc wants to sign in using key “Apple ID authentication (date, time)” in your keychain. The message can quite annoying when communicated all the time, but it flashes for a legitimate reason nonetheless. And no, it’s unlikely to be a malware symptom or attack.

Now, here’s a quick rundown of the technical details. When the Safari browser goes on a secure website, the site gives a certificate to be signed. The browser, in turn, has to sign the certificate using one from the keychain.

There might be a confusion in the keychain between the right and wrong certificates, and Safari then attempts to use the wrong certificate. Suppressing the unwelcome certificate can lead the signing process to work properly. But be careful about suppressing a system or root certificate – it can cause access problems to relevant websites.

Some users find that the message constantly surfaces when they open a new tab in Safari. As they suspect that a specific website is causing the issue, their solution is to remove the said site from their Top Sites section. As a result, Safari no longer prompts them for the certificate every time.

The MIT.edu website offers specific steps to tackle this issue (thus below is an MIT-specific example). Follow these instructions:

  1. Open Keychain Access.
  2. Click on keys located under Category on bottom left part.
  3. Click on the Name column header to sort by name.
  4. Locate your MIT personal certificate, which is yourname Certificate.
  5. Double-click on that line.
  6. Next, click on Access Control.
  7. Click on the + sign. Afterwards, the Webkit.Framework folder should automatically open. (/System/Library/Frameworks/WebKit.framework)
  8. Go to Versions > A > XPC Services.
  9. Choose com.apple.WebKit.Networking.xpc.
  10. Click Add.
  11. Finally, click Save Changes.

Final Notes

It can be fairly easy to dismiss it as another malware threat, but com.apple.WebKit.Networking.xpc is actually a legitimate, even necessary component of your Mac system. It is found in anything from Safari to Messages to anything that requires you to have internet connection.

As always, it pays to be very discerning when dealing with unfamiliar files and programs. Recklessly getting rid of legitimate items, too, can be as dangerous as letting things slide.

Have you come across com.apple.WebKit.Networking.xpc? Let us know your thoughts!

Give us some love and rate our post!
[Total: 0 Average: 0]
Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
Featured Stories
The Dark Side on Your Mac: How to Switch to Dark Mode
Mac
macOS Terminal Guide: Basic to Advanced
How to Keep Your Mac Cool: Monitoring Mac CPU Temperatures
Mac