Please check the build logs for more information.
See Builds for ideas on how to fix a failed build, or Metadata for how to configure docs.rs builds.
If you believe this is docs.rs' fault, open an issue.
spath

Windows PATH security scanner and optimizer.
Problem
Windows PATH entries with spaces but without quotes create security vulnerabilities that can be exploited for privilege escalation attacks.
Solution
spath detects and fixes these vulnerabilities automatically.
Installation
Download (easiest)
Download from GitHub Releases:
spath-setup.exe— Installer (adds to PATH automatically)spath.exe— Standalone executablespath-windows-x64.zip— Archive with docs
From crates.io
From source
Binary location: target/release/spath.exe
Commands
Scan
Analyze PATH for security issues.
Verify
Check if critical issues are actually exploitable by verifying the presence of malicious files.
This command checks if unquoted paths with spaces can actually be exploited by looking for malicious files like C:\Program.exe that could hijack legitimate programs.
Fix
Fix USER PATH issues (no admin required).
Analyze
Analyze both SYSTEM and USER PATH.
Clean
Remove duplicate paths and optimize PATH.
Visualize
Display PATH structure with visual indicators.
Visual indicators:
- ✓ (green) - Path exists and is valid
- ✗ (red) - Path does not exist
- ⚠ (yellow) - Path has issues (unquoted spaces, duplicates)
- (cyan) - User-specific paths
Backup Management
Issue Types
CRITICAL: Unquoted paths with spaces in system directories (e.g., C:\Program Files) - potential security vulnerability that could be exploited
WARNING: Non-existent paths, relative paths, or unquoted paths with spaces that don't exist
INFO: Informational messages about properly quoted paths or minor issues
Security Verification
The verify command distinguishes between:
- Potential risks: Vulnerable paths but no exploit files detected (safe for now)
- Real threats: Malicious files found that could exploit the vulnerability (immediate action required)
Example: If C:\Program Files\App\bin is in PATH without quotes, the tool checks for:
C:\Program.exeC:\Program.comC:\Program.batC:\Program.cmd
Workflow
Basic Workflow
- Scan:
spath scan --audit - Verify:
spath verify(check for real threats) - Backup:
spath backup - Fix USER PATH:
spath fix - Remove duplicates:
spath clean - If needed, restore:
spath restore <backup-file>
Advanced Workflow (with SYSTEM PATH)
- Scan SYSTEM:
spath scan --system - Verify SYSTEM:
spath verify --system(check for exploits) - If safe, consider fixing SYSTEM PATH (requires admin rights)
Requirements
- Windows 10 or later
- Rust 1.70+ (for building from source)
Options
--dry-runor-d- Preview changes without applying--delicate- Ask for confirmation before applying changes--systemor-s- Include SYSTEM PATH operations (requires admin)--verboseor-v- Show detailed information--auditor-a- Show detailed audit report
Notes
- USER PATH changes do not require administrator rights
- SYSTEM PATH changes require administrator rights
- Automatic backup before any changes
- Restart applications to apply PATH changes
- Use
--delicatefor extra safety with confirmation prompts
License
MIT License - see the LICENSE file for details
Changelog
See CHANGELOG.md for version history and release notes.