skills/mukul975/anthropic-cybersecurity-skills/exploiting-constrained-delegation-abuse/Gen Agent Trust Hub
exploiting-constrained-delegation-abuse
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizessubprocess.check_outputto execute system commands. These commands are primarily focused on querying Active Directory using PowerShell to identify delegation configurations and interacting with security-focused CLI utilities like those found in the Impacket suite. - [EXTERNAL_DOWNLOADS]: The documentation in
SKILL.mdandreferences/standards.mdincludes references to established external security tools and repositories on GitHub, such as Rubeus, Impacket, and PowerSploit. These are industry-standard tools for penetration testing and red-teaming activities. - [CREDENTIALS_UNSAFE]: The documentation and script parameters include examples of credentials and NTLM hashes. These are provided as placeholders (e.g., 'Password123') or as CLI argument handlers for testing purposes and are not hardcoded secrets used for exfiltration.
Audit Metadata