The clip shows how an app can be used to compromise the Mac operating system, bypassing privacy controls and permitting access to a user's address book.
This information, containing contacts for demo purposes, was then copied to the machine's desktop.
Speaking to Bleeping Computer, Wardle said it was possible to use an app without any privileges to exploit the zero-day flaw due to how Apple has "implemented the protections for various privacy-related data."
The researcher, furthermore, described the vulnerability as a "trivial, albeit 100 percent reliable flaw in their implementation."
However, the zero-day flaw does not affect all of the new operating system's privacy features.
There are few technical details available relating to the zero-day vulnerability, which is expected due to the date of release and the need to give Apple time to resolve the flaw while keeping users safe from exploit due to public proof-of-concept (PoC) releases or the release of information that attackers can use to exploit the bug.
A detailed explanation of the security flaw will be taking place in November at the security researcher's Objective by the Sea conference.
Wardle says on Twitter that he attempted to contact the iPad and iPhone maker's security team but was unsuccessful in doing so.