win-uia
Audited by Socket on May 17, 2026
4 alerts found:
Anomalyx2Securityx2No direct malicious code is visible in this fragment (no network/process execution/credential harvesting). However, the library is a powerful UI automation primitive that can focus windows, click/type/scroll, and also read UI element values and capture screenshots. If an attacker can influence BatchRequest inputs or obtain returned screenshot/UI data, this can enable UI-driven abuse (e.g., data extraction or unauthorized user-automation). Review how Execute() is exposed and add strict authorization/allowlisting and target restrictions.
This module is a Windows UI automation/input-simulation utility that injects mouse/keyboard events via SendInput and can overwrite the system clipboard and paste via synthetic Ctrl+V. There is no direct evidence of malware (no network/file/persistence/exec or exfiltration) in the provided fragment. The main security concern is abuse potential: attacker-controlled callers could use these capabilities to drive unintended UI actions or inject arbitrary text into the user’s active context. Review how the hosting package authenticates/authorizes callers and limits what text/coordinates/elements can be targeted.
No direct malicious payload is evident in the JavaScript wrapper itself, but the module materially increases security risk by (1) executing a native `uia.exe` with arguments derived from caller-controlled inputs and (2) exposing powerful desktop automation capabilities, including clipboard read/write and screenshotting. The most notable supply-chain/execution risk is the executable resolution fallback to a non-absolute `uia.exe`, which can enable execution hijacking/planting if an attacker can place or influence the resolved binary. This should be reviewed and constrained with strict trust boundaries around who can call these tools and how `uia.exe` is sourced/verified.
This module implements a localhost UI automation and inspection web service with very high-impact capabilities: window control, screen capture, clipboard read/write, and application launching driven directly by untrusted HTTP input. While there is no clear obfuscation or overt malicious payload, the absence of authentication/authorization and the exposed system-interaction endpoints make it highly susceptible to abuse (data theft/modification and unintended process launching) if the service is reachable by untrusted code. Overall: not clear malware in the fragment, but significant security risk due to exposed powerful control/data-access interfaces.