Out of Scope ≠ Low Impact
In early 2025, I reported a serious weakness in the PowerShell Gallery to Microsoft’s MSRC team.
With a single authenticated account, I was able to enumerate every maintainer’s private email address
and silently collect visitor metadata (IP, ASN, location, user-agent, TLS) through the IconUri
field.
This wasn’t a handful of people.. it was complete coverage of the Gallery’s 14,000+ packages and half a million uploads.
My report was acknowledged, but ultimately ruled “out of scope.” That meant no bounty, no credit, and no fixes beyond the immediate patches. But the potential impact was staggering.
What I Could Have Done
Let’s talk specifics. With the email of every maintainer, I could have run a phishing campaign more credible than the one that just compromised npm where attackers hijacked only a subset of accounts and still managed to poison packages downloaded 2 billion times per week. That incident is already being measured in millions of dollars in downstream security costs and incident response.
On the PowerShell side, one target stands out: PsReadLine. This module ships by default on every Windows 11 system. If I had hijacked its ownership and injected malicious updates, the impact would have been planetary. Think about it: every new Windows installation, every developer, every IT admin pulling tainted code automatically.
What kind of payloads could fit into such a supply-chain compromise? A few examples:
- Harvesting every user’s Windows account email and sending it back to an attacker.
- Exfiltrating sensitive files such as RSA private keys from developer machines.
- Installing a persistent backdoor into PowerShell itself, giving attackers a foothold on millions of endpoints instantly.
For context, if npm’s breach cost millions by hitting only a portion of their ecosystem, imagine the bill Microsoft would face if every Windows 11 machine silently pulled and ran hostile PowerShell code. We’re not talking about millions anymore.. we’re talking billions in damage, class-action lawsuits, and trust erosion in the core operating system itself.
Why This Site Exists
Instead of weaponizing this, I chose to disclose it responsibly. I even registered this domain
powershellgallery.dev
to prevent it from being used against Microsoft.
If I were malicious, I could have sent perfectly credible phishing emails from this very domain,
addressed by name to every maintainer, personalized with their IP, location, and browser details.
This site demonstrates what those emails could have looked like and why dismissing this issue as “out of scope” was a dangerous mistake. For a deeper technical walkthrough including the attack chain and code, see my blog write-up: powershellforhackers.com: PowerShell Gallery PII Leak .