Thread:ThePokegeek5000/@comment-36971458-20190523021630/@comment-31984232-20190524032952

It honestly can be exploited in bad ways if you know how. If I were a vandal on other random school computers... it would be practically untraceable to me, and I'd know ways to exploit weaknesses... such as the fact that WHAM doesn't undo renames (I requested it to have that feature added, still hasn't)