Install the Misaka v3.0.9 update to get important security patches & new features

Since being updated to version 3.0 this week, the Misaka package manager app for MacDirtyCow & kfd exploit-vulnerable devices has received a lot of smaller bug fix updates.

Misaka UI.

More recently, however, Misaka saw updates to versions 3.0.8 and 3.0.9, each of which appear to introduce a truck load of new features and improvements. Indeed, project lead developer @straight_tamago has been hard at work

As for what’s new in the aforementioned updates, we’ll get into that below:

Misaka v3.0.8

For general users:

– Improved CPU usage efficiency (reduced device heat generation)
– Improved repository loading efficiency
– Fixed an issue where navigating from the file manager’s clipboard path did not work
– On the tweak page, long press the preview screenshot and save it to your photo library

For developers:

– Can copy sha256 when exporting tweak

Misaka v3.0.9

For users:

– Tweaks from the PureKFD/Picasso repository are now displayed in the news
– Improved repository categories
– Kfd passcode bug fixed
– Debug logs are now available without developer mode
– Improvement of kfd execution speed
– Show version in update alerts

For developers:

– KFDAPI is now available; getVnodeAtPathByChdir, createFolderAndRedirect, UnRedirectAndRemoveFolder
– Added symlink function to FSAPI

Vulnerability

– Addressed an issue where FSAPI could bypass Misaka’s JS sandbox and gain unauthorized full access to the file system
– Addressed an issue where RequestAPI could bypass Misaka’s JS sandbox and gain unauthorized full access to the network
– Fixed and issue that could allow unauthorized access to the root directory of other tweaks using PiPAPI

While there are new features and bug fixes & improvements in both updates, we emphasize the importance of updating to Misaka v3.0.9 because it contains at least three important security patches to help keep add-ons in check.

Having said that, whether you’re a new/prospective user, or you’ve been using Misaka for a long time, we highly recommend upgrading to the latest version at your earliest convenience to take advantage of these fixes.

  • How to perma-sign Misaka on iOS & iPadOS 15.0-15.4.1 with TrollStore
  • How to sideload Misaka on any firmware with Sideloadly

Please note that using add-ons installed with Misaka requires a compatible device vulnerable to either the MacDirtyCowexploit present in iOS & iPadOS 15.0-16.1.2 or the kfd exploit present in iOS & iPadOS 16.0-16.6 beta 1.

Are you running the latest version of Misaka yet? Let us know why or why not in the comments section down below.

CDN CTB