Most PDF readers parse and render in one step. That single step is where every PDF exploit lives. Sherlock splits the pipeline in two.
- Step 1: Safe Parse (automatic)
- The file is parsed by lopdf, a pure Rust PDF library. No JavaScript engine. No URL handler. No action executor. Text, structure and metadata are extracted. Nothing runs.
- Step 2: Visual Render (explicit click only)
- When you decide the file is safe, click Render. Pdfium (Chrome's PDF engine) handles visual layout in an isolated context. This step never happens automatically.
- Zero Outbound Traffic
- The application makes no network connections. No telemetry, no update checks, no license validation, no DNS queries. Your PDFs stay on your machine. Verify with Wireshark if you do not believe us.
A sandbox lets malicious code run and hopes to contain it. Sherlock never runs the code in the first place. Prevention, not containment.