Sure, in many cases the dev’s computer is powerful enough to handle that.
However:
- The more the dependencies, the more likely it is to pull-off a supply chain attack. Any of those thousands modules can be compromised and infect either the user or the developer.
- Not all computers are optimized for working with so many tiny files. Have you ever worked in a company that uses McAfee Antivirus? Even Defender can be a massive performance hit in some cases.
There is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it’s very hard to be completely sure about what you are touching.
If you need a debloated experience, install LTSC.