Automac IT
← Back to Automac IT

Compliance and Security Review Guide

For IT administrators, security reviewers, and compliance officers evaluating Automac IT for organizational use. Every claim is verified against source code. Repository: github.com/beautifulplanet/Automac-IT
📄 Download as PDF

1. Data Flow Overview

User's Windows PC

User Types

Plain English message

Helpdesk Webview

Conversation UI

Tool Executor

Runs PowerShell locally

User Message

Sent as-is (not scrubbed)

PII Scrubber

Raw output → scrubPII() → scrubbed output

Conversation Array

System prompt + user messages + scrubbed tool output

Session Logger

Local .md file (scrubbed)

HTTPS → AI Provider

GitHub Copilot or Anthropic

AI Receives

  • System prompt (static)
  • User messages (unscrubbed)
  • Tool output (scrubbed)

AI Does NOT Receive

  • License key
  • Session logs
  • Telemetry

Key Data Flows

DataSourceScrubbed?Destination
User typed messagesUser keyboardNoAI provider, local log (scrubbed in log)
Tool output (raw)PowerShellN/AUser's webview only
Tool output (to AI)Scrubber outputYesAI provider
Session log entriesAll conversationYesLocal file only
License keyUser configN/ALicense server only
Extension settingsVS Code settingsN/ALocal only

2. Threat Model Summary (STRIDE)

Spoofing

Tampering

Repudiation

Information Disclosure

Denial of Service

Elevation of Privilege

3. What the AI Provider Cannot Receive

Identity Information

Network Information

Secrets and Credentials

What Is NOT Scrubbed

4. Local Logging

Session Logs

PropertyDetail
FormatMarkdown files (.md), one per session
LocationUser-chosen local folder (automacit.sessions.folder setting)
NamingYYYY-MM-DD_ticketId_title.md
ContentTimestamp, role, text, tool call details, action approval status
ScrubbingAll text passed through scrubPII() before writing
TruncationTool output truncated to 2,000 characters in logs
Network restrictionUNC paths blocked — local drives only
RetentionNo automatic deletion. User manages their own folder
IntegrityNo checksums or tamper detection. Convenience records

Audit Log (v0.9.1)

PropertyDetail
FormatJSON files, one per session
Location%APPDATA%/automac-it/audit/
ContentTimestamp, matched scrub rule name, match count, session ID
Does NOT containThe actual PII value — only that a pattern was matched
RetentionFiles older than 30 days auto-deleted on startup
PurposeShows “what was hidden” per session via Safety Helper panel

5. PII Scrubbing Methodology

Implementation

Pattern List

20 static rules + 2–3 dynamic rules (hostname, username, short-username). See Section 3 for the complete categorized list.

Processing Order

Rules are applied sequentially in array order. More specific rules appear first and take priority when patterns overlap.

Performance

Known Limitations

  1. False positives: Version numbers like 10.0.19041 may be partially matched by IPv4 rules. Mitigated by negative lookahead but edge cases remain.
  2. False negatives: Data not matching any pattern passes through unscrubbed.
  3. Short usernames: Under 4 characters, only scrubbed in context (\Ed, @Ed, User: Ed).
  4. Encoding: UTF-8 strings only. Binary data not handled.
  5. One-way: Scrubbed text cannot recover original values.

User Controls

6. System Prompt Security

Three Modes

ModeCapabilityWhen Used
ActionFull tool access, auto-executionDefault mode
GuidedFull tool access, asks before every toolUser preference
Chat-onlyNo tools, advice onlyUser preference

Hard Rules in All Modes

All three system prompts contain the “NEVER ASK FOR” directive: never ask for passwords, PINs, SSNs, credit card numbers, bank account details, medical information, login credentials, or government-issued ID numbers.

Injection Defense

Tool output is sanitized to remove bracket-pattern state markers before reaching the AI conversation. Blocked: [TOOL_CALL:...], [TOOL_RESULT:...], [TOOL_ERROR:...], [USER_DENIED:...], [LICENSE_REQUIRED:...].

7. Tool Restrictions Summary

Protected Processes (cannot be killed)

System-critical (csrss, lsass, winlogon, services, smss, wininit), display (dwm, explorer), security (msmpeng, securityhealthservice), drivers (nvlddmkm, audiodg), and the extension itself (code, automacservice).

Protected Programs (cannot be uninstalled)

Windows components (Defender, Update, Installer), runtimes (.NET, Visual C++), GPU drivers (NVIDIA, AMD, Intel), audio drivers (Realtek), antivirus products, and Automac IT.

Protected Services (cannot be restarted)

System-critical (lsass, services, rpcss, dcomlaunch), security (windefend, mpssvc), infrastructure (eventlog, cryptsvc, trustedinstaller), and automacservice.

Blocked PowerShell Commands (40+ patterns)

Disk destruction, internet access, user account manipulation, script execution, sub-shell spawning, boot record modification, encoded command injection, and system file deletion. Full list in source code (tools.ts).

File System Restrictions

8. Deployment Considerations

Network Requirements

Local Footprint

Permissions

Organizational Controls

Verified against Automac IT source code. Last updated: 2026-04-18. Version: v0.9.1