• Xp_cmdshell does not maintain a users identity all the way through the stack, which impedes auditing and allows for obfuscation of the identity of the person running the command.

    Once you start building process around it, it opens you up for ad hoc requests from malicious users because its enabled and execution of it is hard to differentiate.

    It's just hard to justify why anyone would ever start using it when there are more feature-rich, secure, and auditable tools available.

    There are no special teachers of virtue, because virtue is taught by the whole community.
    --Plato