Critical-risk tools in Opencut Controller
22 of the 161 tools in Opencut Controller are classified as critical risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at critical risk
-
audio_sound_clear_savedDestructiveClear all saved sounds from the library
-
audio_sound_remove_savedDestructiveRemove a sound from the saved sounds library
-
bookmark_removeDestructiveRemove a bookmark at a specific time
-
canvas_clear_layout_guideDestructiveRemove the active layout guide
-
keybinding_removeDestructiveRemove a keybinding for a specific key
-
keybinding_reset_defaultsDestructiveReset all keybindings to their defaults
-
keyframe_effect_param_removeDestructiveRemove a keyframe from an effect parameter
-
keyframe_removeDestructiveRemove a keyframe from an element property by keyframe ID
-
media_clear_allDestructiveRemove all media assets from the project
-
media_removeDestructiveRemove a media asset from the project
-
panel_resetDestructiveReset all panels to default sizes
-
project_cancel_exportDestructiveCancel an in-progress export
-
project_clear_export_stateDestructiveClear the export state after completion
-
project_deleteDestructiveDelete a project by ID
-
scene_deleteDestructiveDelete a scene by ID
-
sticker_clear_recentDestructiveClear the recent stickers list
-
text_deleteDestructiveDelete a text element
-
timeline_effect_removeDestructiveRemove an effect from a timeline element
-
timeline_element_deleteDestructiveDelete one or more elements
-
timeline_element_preview_discardDestructiveDiscard the active preview and revert elements to their original state
-
timeline_track_removeDestructiveRemove a track by ID
-
transcription_cancelDestructiveCancel an in-progress transcription
Attacks that target this class
Critical-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.