We could improve our sandbox slightly by only extending access to 'com.apple.print.normalizerd' when we encounter EPS content. It's not used in other content, and these files are fairly uncommon.
<rdar://problem/77853004>
When an attacker has code execution already, isn't it up to them to decide what to tell UI process about content type? This would seem like a trivially minor nuisance to the attacker to bypass.