exploiting-active-directory-with-bloodhound

Fail

Audited by Snyk on Apr 6, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This skill pack explicitly provides step‑by‑step offensive Active Directory exploitation guidance (data collection/exfiltration, credential theft via Kerberoast/AS‑REP and LSASS dumps, lateral movement with PsExec/WMI, GPO/scheduled‑task remote code execution, and ACL abuse) and automation scripts to facilitate those actions, so it is intentionally enabling malicious activity despite an authorization notice.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs transferring and executing SharpHound collectors, exfiltrating data, identifying and exploiting privilege escalation paths (e.g., DCSync, ACL abuse) and "execute identified attack chain," which are active offensive actions that run code on and modify the state of target hosts (and could direct the agent to perform those actions on its host).

Issues (3)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 6, 2026, 03:47 PM
Issues
3