Automac IT
← Back to Automac IT

OPSEC Guide for Users

This guide explains what Automac IT can see, what it sends to the AI, and how to use it safely. Every claim is verified against the actual source code. If you find a discrepancy, report it at github.com/beautifulplanet/Automac-IT/issues.
📄 Download as PDF

1. What Automac IT Can See

Automac IT runs diagnostic tools on your Windows PC using PowerShell. Here is the complete list of what those tools can access:

System Information

Installed Programs

Running Processes

Startup Programs

Disk and Files

Network

Windows Services

Event Logs

Windows Update

Custom PowerShell (Last Resort)

2. What Gets Sent to the AI

When Automac IT runs a tool, the raw output is shown to you in the chat window. Before that same output is sent to the AI provider, it is scrubbed — sensitive patterns are replaced with bracketed placeholders.

What the Scrubber Catches

Data TypeExampleReplacement
Windows username in pathsC:\Users\JohnDoe\DocumentsC:\Users\[user]\Documents
Your username as a wordOwner: JohnDoeOwner: [user]
Your computer nameDESKTOP-ABC123[computer name hidden]
Private IPs192.168.1.105[local IP hidden]
Public IPs203.0.113.45[IP hidden]
IPv6 addressesfe80::1[IPv6 hidden]
MAC addressesAA:BB:CC:DD:EE:FF[MAC address hidden]
Email addressesjohn@example.com[email hidden]
Domain\account pairsCORP\jdoe[domain\account hidden]
API keys and tokensapi_key=sk-abc123...[secret hidden]
Bearer tokensBearer eyJ...[token hidden]
AWS access keysAKIAIOSFODNN7EXAMPLE[AWS key hidden]
Stripe keyssk_live_...[Stripe key hidden]
GitHub tokensghp_xxxx...[GitHub token hidden]
JWTseyJhbG...[JWT hidden]
Connection stringspostgres://user:pass@host/db[connection string hidden]
PEM private keys-----BEGIN PRIVATE KEY-----[private key hidden]
Social Security Numbers123-45-6789[SSN hidden]
GUIDs550e8400-e29b-...[ID hidden]

What the Scrubber Does NOT Catch

This is why the scrubber is described as “best-effort” and not “guaranteed.”

⚠ Your Typed Messages Are NOT Scrubbed

This is intentional. The AI needs your exact words to understand your problem. If you type “my WiFi password is hunter2,” the AI provider receives exactly that text.

Where Data Goes

⚠️ Recommended: Disable AI training on your chats

If you use GitHub Copilot as your AI provider, your conversations may be used by GitHub to improve their models unless you opt out.

To opt out: Open VS Code → Settings (Ctrl+,) → search for github.copilot.chat.codeGeneration.useCodeSnippetsOnServer and uncheck it. Also go to github.com/settings/copilot → uncheck “Allow GitHub to use my code snippets from the code editor for product improvements.”

This is a GitHub setting, not an Automac IT setting. We recommend disabling it unless you’re comfortable contributing your diagnostic conversations to AI training data.

3. What the AI CANNOT Do

Automac IT's tools have hard-coded restrictions. The AI cannot bypass these regardless of what it says or what you ask:

4. Safe Practices When Chatting — The 30 Rules

Privacy — The Never Share List (Rules 1–6)

  1. Never paste passwords, API keys, or tokens into chat.
  2. Never paste credit card numbers, SSNs, or bank account numbers.
  3. Never paste medical records, prescriptions, or diagnoses.
  4. Don't paste full names + addresses together — the combination creates PII.
  5. Assume anything you type to the AI leaves your machine. Tool output is scrubbed. Your typing is not.
  6. If you pasted something sensitive by accident, start a new session.

File Safety — The Always Check List (Rules 7–11)

  1. Always review the full preview before clicking Apply on a file move.
  2. Always verify a duplicate is actually identical before deleting — same size ≠ same contents.
  3. Never run a destructive tool on a folder you don't recognize.
  4. If a file path is in a system folder, don't touch it.
  5. Rollback exists, but assume it might fail — act like there's no undo.

AI Fallibility — The Don't Trust, Verify List (Rules 12–16)

  1. The AI can be confidently wrong. Confidence ≠ correctness.
  2. If the AI says a fix worked, verify the original problem is actually gone.
  3. If the AI suggests something that feels wrong, it probably is.
  4. Never let the AI make the same suggestion twice without checking why the first attempt failed.
  5. If the AI hits the loop limit, stop. Don't just restart it.

Destructive Tools — The Slow Down List (Rules 17–20)

  1. Read the confirmation banner. Every time. Even the tenth time.
  2. If you're tired, annoyed, or in a hurry, close the helpdesk.
  3. One destructive action at a time. Finish, verify, then next.
  4. If you don't understand what a tool does, don't approve it.

Reporting — The Before You Share List (Rules 21–24)

  1. System reports contain info about your machine. Review before sharing publicly.
  2. Never post a full report on a forum or social media without redacting.
  3. IT support and technicians are fine. Public posts are not.
  4. Screenshots of error messages are safer than raw logs.

Redundancy — The IT Habits List (Rules 25–30)

  1. Before a big operation, make sure your important files are backed up.
  2. If you're not sure, back out and ask. Aborting is free. Undoing is expensive.
  3. Slow is smooth. Smooth is fast. Rushed is broken.
  4. Critical claims get two checks.
  5. Changes to system settings should be reversible.
  6. When in doubt, don't.

5. File Organization Safety

Preview Mode

Every file operation shows a preview first. You see every file that will be moved, where it's coming from, and where it's going. Nothing happens until you approve.

Rollback

After a file operation, a rollback log is saved as a JSON file recording every move (source → destination). You can use this to reverse the operation.

But rollback is not a guarantee:

Act like there's no undo.

What to Do If Something Goes Wrong

  1. Don't panic. Most file moves are harmless — the file still exists, just in a different location.
  2. Try rollback first — it works for the majority of cases.
  3. If rollback fails, the rollback log tells you where each file went. You can move them back manually.
  4. If you can't find a file, check the Recycle Bin.
  5. This is why Rule 25 says to back up before big operations.

6. Security Audit Interpretation

Open Ports

Firewall Status

Windows Update

The AI's Interpretation

7. Export Report Safety

8. Your Rights and Controls

Data Control

What You Can Ask the AI

License

Verified against Automac IT source code. Last updated: 2026-04-18. Version: v0.9.1