exploiting-smb-vulnerabilities-with-metasploit

Fail

Audited by Snyk on Apr 10, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes explicit plaintext credentials and NTLM/LM hash values and shows commands that embed these secrets verbatim (e.g., -p 'TestPass123', hashdump outputs, -H/SMBPass with hashes), which forces the agent to handle and output sensitive secret values directly.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content, while framed for authorized testing, contains explicit, actionable exploitation and post‑exploitation instructions (EternalBlue/metasploit meterpreter reverse shells, NTLM relay/Impacket/responder workflows, hashdump, pass‑the‑hash, psexec) that enable credential theft, remote code execution, lateral movement and full domain compromise and can be directly abused for malicious activity.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned for high-entropy, directly usable credential material. The document contains NTLM password hash values in multiple places:
  • The hashdump output line: "Administrator:500:aad3b435b51404eeaad3b435b51404ee:e19ccf75ee54e06b06a5907af13cef42:::"
  • The shortened/individual hashes used elsewhere: "aad3b435b51404eeaad3b435b51404ee:e19ccf75ee54e06b06a5907af13cef42" and "e19ccf75ee54e06b06a5907af13cef42"

These are high-entropy NTLM hashes and are shown being used with pass-the-hash / psexec / crackmapexec commands, so they are directly usable credentials (i.e., meet the definition of a secret).

I ignored low-entropy/example values such as 'TestPass123' (simple example password), IPs/ports, and placeholder tokens like "", since those fit the "setup/example/placeholder" rules.


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs running privileged local commands (e.g., "sudo impacket-ntlmrelayx", "sudo responder"), starting services/listeners and executing exploits from the agent's host—actions that require elevated privileges and modify the host's state—so it pushes the agent to perform state-changing, potentially harmful operations.

Issues (4)

W007
HIGH

Insecure credential handling detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W008
HIGH

Secret detected in skill content (API keys, tokens, passwords).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 10, 2026, 08:31 AM
Issues
4