windows-explorer-advanced

Fail

Audited by Socket on Mar 6, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The provided PowerShell examples implement expected functionality for a Windows File Explorer assistant: local file enumeration, Quick Access manipulation, disk usage reporting, and optional cleanup operations. There is no sign of network exfiltration, embedded credentials, obfuscated payloads, or explicit malware behavior in the snippets. Primary security concerns are: (1) destructive commands (Clear-RecycleBin -Force and any delete actions) that must require enforced human confirmation to prevent data loss; (2) COM automation that can change shell state or reveal shortcut targets (privacy exposure); and (3) broad recursive enumeration that can surface sensitive file metadata which becomes risky if outputs are transmitted externally. If the runtime strictly enforces HITL for destructive actions and prevents automated external transmission of sensitive outputs, the code is appropriate for the stated purpose. Otherwise, use carries a moderate privacy/destructive risk.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 6, 2026, 04:24 PM
Package URL
pkg:socket/skills-sh/malue-ai%2Fdazee-small%2Fwindows-explorer-advanced%2F@962bd0b4373896f4bba238de80c9888910066263