According to Vulnsec, Sequel Pro is listed as one of the apps using the Sparkle framework: a man in the middle attack vector has been identified with this, so I was just wondering whether the SP devs could shed some light on the status of the app? If it's vulnerable, will an interim security fix version of SP be released that uses the patched version of Sparkle?
https://vulnsec.com/2016/osx-apps-vulnerabilities/In the meantime, I've switched off the auto-update checking.