Macs are “more easy” targets as the hardware is common among them.
Other hardware and operation systems can be a target too.
In theory a drive by is a scenario for this irreversible danger.
Does the comodo sandbox protect against hardware code changes?
Does comodo ask for hardware code changes?