| Version | Supported |
|---|---|
| 0.9.x | ✅ |
If you discover a security vulnerability in CMDHelper, please report it by:
- DO NOT open a public GitHub issue for security vulnerabilities
- Email security concerns to: security@authoritygate.com
- Include a detailed description of the vulnerability
- Include steps to reproduce if possible
As this is an unsupported open-source utility:
- We will make reasonable efforts to review security reports
- Response times are not guaranteed
- Critical vulnerabilities will be prioritized
CMDHelper requires elevated permissions for:
- Installation: Writing to
C:\Program Files\and system registry - Admin Mode: Launching elevated command prompts via UAC
- Does not collect or transmit any data
- Does not connect to the internet
- Does not install any services or drivers
- Does not modify system files beyond documented registry entries
- Does not store any credentials or sensitive information
CMDHelper creates registry entries in:
HKEY_CLASSES_ROOT\Directory\shell\(context menu)HKEY_LOCAL_MACHINE\SOFTWARE\AuthorityGate\CMDHelper(settings)
All registry changes can be completely reversed using --uninstall.
Pre-built releases are not code-signed. Windows SmartScreen may display a warning. Users concerned about this should:
- Build from source using Visual Studio
- Review the source code before building
- Sign the resulting executable with their own certificate
- Download releases only from the official GitHub repository
- Verify file hashes if provided with releases
- Review source code changes before updating
- Run
--uninstallbefore removing the application manually