windows
✓Verified·Scanned 2/18/2026
This skill documents Windows operational patterns, PowerShell usage, credential management, remoting, logging, and file-handling. It includes explicit commands that store/retrieve credentials (e.g., cmdkey /generic:"MyService" /user:"admin" /pass:"secret", Export-Clixml -Path "cred.xml") and many shell commands to run.
from clawhub.ai·vadbbc8f·3.5 KB·0 installs
Scanned from 1.0.0 at adbbc8f · Transparency log ↗
$ vett add clawhub.ai/ivangdavila/windows
Credential Management
- Never hardcode passwords in scripts — use Windows Credential Manager:
# Store cmdkey /generic:"MyService" /user:"admin" /pass:"secret" # Retrieve in script $cred = Get-StoredCredential -Target "MyService" - For scripts, use
Get-Credentialand export securely:$cred | Export-Clixml -Path "cred.xml" # Encrypted to current user/machine $cred = Import-Clixml -Path "cred.xml"
Silent Failures
- Windows Defender silently quarantines downloaded scripts/executables — check quarantine if script disappears
- Group Policy overrides local settings silently —
gpresult /rto see what's actually applied - Antivirus real-time scanning blocks file operations intermittently — add exclusions for build/automation folders
- PowerShell
-ErrorAction SilentlyContinuehides problems — useStopand handle explicitly
Symbolic Links
- Creating symlinks requires admin OR SeCreateSymbolicLinkPrivilege — regular users fail silently
- Enable Developer Mode for symlinks without admin: Settings → For Developers → Developer Mode
mklinkis CMD-only, PowerShell usesNew-Item -ItemType SymbolicLink
Script Signing
- Unsigned scripts fail on restricted machines with confusing errors — sign for production:
$cert = Get-ChildItem Cert:\CurrentUser\My -CodeSigningCert Set-AuthenticodeSignature -FilePath script.ps1 -Certificate $cert - AllSigned policy requires ALL scripts signed including profile.ps1
Operational Safety
- Always
-WhatIffirst on destructive operations —Remove-Item -Recurse -WhatIf Start-Transcriptfor audit trail — forgotten until incident investigation- NTFS permissions:
icaclsfor CLI, but inheritance rules are non-obvious — test changes on copy first
WinRM Remoting
- Enable correctly:
Enable-PSRemoting -Forceisn't enough on workgroups - Workgroup machines need TrustedHosts:
Set-Item WSMan:\localhost\Client\TrustedHosts -Value "server1,server2" - HTTPS remoting needs certificate setup — HTTP sends credentials readable on network
Event Logging
- Scripts should log to Windows Event Log for centralized monitoring:
New-EventLog -LogName Application -Source "MyScript" -ErrorAction SilentlyContinue Write-EventLog -LogName Application -Source "MyScript" -EventId 1000 -Message "Started" - Custom event sources require admin to create — create during install, not runtime
File Locking
- Windows locks files aggressively — test file access before operations:
try { [IO.File]::OpenWrite($path).Close(); $true } catch { $false } - Scheduled tasks writing to same file as user → conflicts. Use unique temp files and atomic rename
Temp File Hygiene
$env:TEMPfills silently — scripts should cleanup withtry/finally:$tmp = New-TemporaryFile try { ... } finally { Remove-Item $tmp -Force }- Orphaned temp files accumulate across reboots — unlike Linux /tmp
Service Account Gotchas
- Services run in different user context —
$env:USERPROFILEpoints to system profile, not user's - Network access from SYSTEM account uses machine credentials — may fail where user succeeds
- Mapped drives don't exist for services — use UNC paths
\\server\share