You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+12Lines changed: 12 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,18 @@ All notable changes to this project will be documented in this file.
4
4
5
5
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/).
6
6
7
+
## [0.5.0] - 2026-03-16
8
+
9
+
### Added
10
+
-**PowerShell profile injection detection** -- scans all four `$PROFILE` paths for suspicious patterns (IEX, encoded commands, download cradles, etc.) and emits WARNING + T1546.013
11
+
-**Root certificate store anomaly detection** -- compares `Cert:\LocalMachine\Root` against 46 well-known CA name fragments; flags unknown root CAs as WARNING + T1553.004 (catches rogue MITM certs)
12
+
-**Category breakdown chart in HTML report** -- stacked horizontal bar chart showing finding counts per module/category, placed between the stats grid and system info
13
+
-**Improved remediation click-to-copy** -- regex now also matches system commands (`sfc`, `netsh`, `reg`, `certutil`, `dism`, etc.) and the `Import-` verb prefix
14
+
15
+
### Changed
16
+
- Version bumped to 0.5.0
17
+
- SECURITY.md updated to mark 0.5.x as supported, 0.3.x as unsupported
`claude_code_prompt.md` (gitignored) is the shared prompt file. Cursor writes implementation prompts to it; Claude Code reads and executes them via:
142
+
143
+
```
144
+
Read claude_code_prompt.md and follow all instructions in it.
145
+
```
146
+
147
+
The file is overwritten for each new prompt. Claude Code prompts must **not** change versioning, documentation, or changelog -- Cursor handles those after reviewing the diff.
-Description "The PowerShell profile '$($profile.Name)' at '$($profile.Path)' contains suspicious patterns. Attackers inject code into PS profiles to execute malicious commands on every PowerShell session. Matched patterns: $($matched-join', ')."`
292
+
-Remediation "Review the profile content: Get-Content '$($profile.Path)'. Remove suspicious lines or rename the file."`
-Description "Root certificate '$($cert.Subject)' in Cert:\LocalMachine\Root is not in the well-known CA list. This could be a corporate proxy CA (benign) or a rogue certificate installed by malware to intercept HTTPS traffic via MITM."`
336
+
-Remediation "Review the certificate in certlm.msc. If unexpected, remove it: Remove-Item 'Cert:\LocalMachine\Root\$($cert.Thumbprint)'"`
337
+
-Details @{
338
+
Subject=$cert.Subject
339
+
Thumbprint=$cert.Thumbprint
340
+
NotBefore=$cert.NotBefore
341
+
NotAfter=$cert.NotAfter
342
+
FriendlyName=$cert.FriendlyName
343
+
Issuer=$cert.Issuer
344
+
} `
345
+
-MITRE @("T1553.004")
346
+
}
347
+
}
348
+
} catch {
349
+
Write-Status"Could not check root certificate store: $_"-Color Yellow
0 commit comments