What are the security risks of leaked GUIDs from Windows Terminal(Preview) settings(JSON) file? Should I be worried?

W

Windows user_926

I was configuring Windows Terminal(Preview) JSON file, but I encountered an error in JSON formatting So I posted it on online JSON validator. After that I realized that It contained some GUID's from Powershell, cmd, bash, Azure cloud shell.

After some research I found that GUIDs are unique to every person in the world and it is just a unique identifier. So can any sensitive information can be extracted from leaked GUID? I also tried to regenerate GUIDs in powershell and replaced all old GUIDs with new one but everytime I restart the Windows Terminal(Preview) app it just automatically regenerate same old GUIDs. So what is the solution now?

PS: My main concern here is just Security and Privacy


Sample config. file from random internet source(See the GUIDs)




"profiles": [
{
"acrylicOpacity": 0.75,
"closeOnExit": false,
"colorScheme": "Campbell",
"commandline": "cmd.exe /k \"C:\\Users\\CharlieInc\\Desktop\\Prompts\\BuildEnv\\vcpkg-env.bat\"",
"cursorColor": "#FFFFFF",
"cursorShape": "bar",
"fontFace": "Consolas",
"fontSize": 12,
"guid": "{f39b6ee5-a01c-41e3-a652-b95a5f3de9ad}",
"historySize": 9001,
"icon": "ms-appdata:///roaming/vs-32.png",
"name": "VS2019 VCPKG \ud83d\udc96",
"padding": "0, 0, 0, 0",
"snapOnInput": true,
"startingDirectory": "E:\\vcpkg",
"useAcrylic": true
},
{
"acrylicOpacity": 0.75,
"closeOnExit": false,
"colorScheme": "Campbell",
"commandline": "\"C:\\Program Files\\PowerShell\\7-preview\\pwsh.exe\" -NoExit -Command \"$Host.UI.RawUI.WindowTitle=\\\"Windows Pwsh \ud83d\udc99 (7 Preview)\\\";Write-Host\"",
"cursorColor": "#FFFFFF",
"cursorShape": "bar",
"fontFace": "Consolas",
"fontSize": 12,
"guid": "{08a0be98-ff68-4e3a-a054-0fbd3969d3bb}",
"historySize": 9001,
"icon": "ms-appdata:///roaming/pwsh-32.png",
"name": "Windows Pwsh \ud83d\udc99 (7 Preview)",
"padding": "0, 0, 0, 0",
"snapOnInput": true,
"startingDirectory": "C:\\Users\\CharlieInc",
"useAcrylic": true
},

Continue reading...
 
Back
Top Bottom