Your effectively intentioned try to classify a course of by identify gained’t deal with some actual world issues. Assuming Apple doesn’t launch greater than 10 updates a 12 months they usually don’t add greater than a dozen processes on common, you’ve received an enormous effort to navigate what’s altering.
Worse, there’s nothing stopping a nasty actor from naming their course of after one you consider to be secure. There’s an extended historical past of legitimate processes being (ab)used for unhealthy intent.
I’d as a substitute encourage you to study code signing, dangers and advantages of loading code outdoors the App Retailer mannequin. Get some understanding of gatekeeper and Apple anti malware instruments exist the place they log standing, updates and potential points.
Safety begins on the core.
The technically subtle runtime protections in macOS work on the very core of your Mac to maintain your system secure from malware. This begins with state-of-the-art antivirus software program inbuilt to dam and take away malware. Applied sciences like XD (execute disable), ASLR (tackle area format randomization), and SIP (system integrity safety) make it tough for malware to do hurt, they usually be certain that processes with root permission can not change vital system information.
Controlling what you put in, not stress-free settings designed that will help you safe your apps and getting educated on safety hygiene (password and biometric errors folks could make, replace cadence, backups) is a sensible job for many. Manually consulting an inventory that’s crowd sourced to verify for suspicious duties is a canonical Sisyphean job in my expertise.