well I'm using the CACLS method.
I understand that the admin password can be comprised.
But thats only from finding the original file correct?

how can you find it out if you run your code like this...
This is the command i'm using from the kix script thats being executed.
{
SHELL "cscript.exe " + @LDRIVE + "\scripts2\runas.vbs"
}

This is the code inside the runas.vbs file:
{
'////////////////////////////////////////////////////////////////////////////


' Explicit variable declaration and standard globals
Option Explicit
Dim g_sComputerName
Dim g_oShell, g_oFSO, g_oNet

' Set standard globals and create global objects
Set g_oShell = CreateObject("Wscript.Shell")
Set g_oFSO = CreateObject("Scripting.FileSystemObject")
Set g_oNet = CreateObject("WScript.Network")

g_sComputerName = g_oNet.ComputerName

' in this example the command prompt is being run as the administrator
' on the local computer.
g_oShell.Run "runas /user:" & "domain" & "\administrator ""cacls C:\windows\Temp /T /E /G everyone:C"""
Wscript.Sleep 500

' change YourPasswordHere to the local computer administrator account password
' the password must be in the quotation marks
g_oShell.SendKeys password & "{ENTER}"
}

I understand that if the file was to be reached and then opened or copied then yes the password could be comprised.
But having the application run it the way it is I don't see how the password could be comprised when its all self contained.