This project supports the following PowerShell versions:
| Version | Supported |
|---|---|
| 7.x | ✅ Yes |
| 5.1 | ✅ Yes |
| < 5.1 | ❌ No |
If you discover a security vulnerability in any of these scripts, please follow these steps:
-
Do not create a public GitHub issue
-
Send an email to the repository maintainer via GitHub profile with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fixes (if any)
-
Allow time for assessment and resolution
-
Security issues will be prioritized and addressed promptly
- Always review scripts before execution
- Run scripts in test environments first
- Ensure you have appropriate permissions
- Use execution policies appropriately
- Never hardcode credentials in scripts
- Use secure credential storage methods
- Be cautious with scripts that handle sensitive data
- Remove sensitive information from logs
- Scripts that modify registry require special attention
- Always backup systems before running modification scripts
- Test registry changes in isolated environments
- Understand the impact of system modifications
- Be cautious with scripts that connect to remote systems
- Validate network security requirements
- Use secure authentication methods
- Consider firewall and network policy implications
- Principle of Least Privilege: Run scripts with minimum required permissions
- Input Validation: Validate all user inputs and parameters
- Error Handling: Implement comprehensive error handling
- Logging: Log security-relevant events appropriately
- Code Review: Have scripts reviewed by other team members
- Testing: Test scripts thoroughly in safe environments
These scripts are provided "as-is" without warranty. Users are responsible for:
- Testing scripts in their environment
- Understanding script functionality before execution
- Ensuring compliance with organizational security policies
- Backing up systems before making changes
Use these scripts at your own risk and always follow your organization's security guidelines.