deploying-active-directory-honeytokens

Warn

Audited by Socket on Apr 20, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/agent.py

This module is primarily a dual-use AD honeytoken/deception and detection-artifact generator. In the shown fragment it does not directly exfiltrate data or establish malware behavior in Python, but it generates PowerShell payloads capable of modifying Active Directory (creating accounts, setting privileged-looking attributes, and changing audit/SACL settings to trigger security events). The presence of a hardcoded GPP AES key constant is a notable supply-chain red flag. Overall, the security risk is elevated due to high-impact operational behavior and potential misuse, even though classic malware indicators are not evident in this snippet.

Confidence: 62%Severity: 66%
Audit Metadata
Analyzed At
Apr 20, 2026, 11:03 PM
Package URL
pkg:socket/skills-sh/mukul975%2Fanthropic-cybersecurity-skills%2Fdeploying-active-directory-honeytokens%2F@042fd3e43727b1708f0b5e494b2168d39fd96f34