win-mouse-native
Warn
Audited by Socket on Mar 29, 2026
1 alert found:
AnomalyAnomalywin-mouse.cmd
LOWAnomalyLOW
win-mouse.cmd
This batch file is a thin delegating launcher that executes a bundled PowerShell script from a relative path while bypassing PowerShell execution policy and passing through arbitrary command-line arguments. The wrapper itself shows no direct malicious actions, but the policy bypass, lack of script integrity verification, and argument passthrough make it a potentially suspicious supply-chain pattern pending review of scripts\win-mouse.ps1 for actual behavior (e.g., spying, persistence, or exfiltration).
Confidence: 60%Severity: 62%
Audit Metadata