exploiting-constrained-delegation-abuse

Pass

Audited by Gen Agent Trust Hub on Apr 6, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The script scripts/agent.py utilizes subprocess.check_output to execute system commands. These commands are primarily focused on querying Active Directory using PowerShell to identify delegation configurations and interacting with security-focused CLI utilities like those found in the Impacket suite.
  • [EXTERNAL_DOWNLOADS]: The documentation in SKILL.md and references/standards.md includes references to established external security tools and repositories on GitHub, such as Rubeus, Impacket, and PowerSploit. These are industry-standard tools for penetration testing and red-teaming activities.
  • [CREDENTIALS_UNSAFE]: The documentation and script parameters include examples of credentials and NTLM hashes. These are provided as placeholders (e.g., 'Password123') or as CLI argument handlers for testing purposes and are not hardcoded secrets used for exfiltration.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 6, 2026, 11:50 AM