windows-explorer-advanced
Audited by Socket on Mar 6, 2026
1 alert found:
Obfuscated FileThe provided PowerShell examples implement expected functionality for a Windows File Explorer assistant: local file enumeration, Quick Access manipulation, disk usage reporting, and optional cleanup operations. There is no sign of network exfiltration, embedded credentials, obfuscated payloads, or explicit malware behavior in the snippets. Primary security concerns are: (1) destructive commands (Clear-RecycleBin -Force and any delete actions) that must require enforced human confirmation to prevent data loss; (2) COM automation that can change shell state or reveal shortcut targets (privacy exposure); and (3) broad recursive enumeration that can surface sensitive file metadata which becomes risky if outputs are transmitted externally. If the runtime strictly enforces HITL for destructive actions and prevents automated external transmission of sensitive outputs, the code is appropriate for the stated purpose. Otherwise, use carries a moderate privacy/destructive risk.