skills/mukul975/anthropic-cybersecurity-skills/exploiting-zerologon-vulnerability-cve-2020-1472/Gen Agent Trust Hub
exploiting-zerologon-vulnerability-cve-2020-1472
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyusessubprocess.check_output()to execute multiple system tools includingnmap,zerologon_tester.py,wmic, andpowershell. These calls rely on external binaries being present in the system path and execute with the permissions of the user running the agent. - [COMMAND_EXECUTION]: The
SKILL.mdfile provides ready-to-use shell commands for high-risk offensive actions, including resetting the Domain Controller machine account password (cve_2020_1472.py), performing DCSync attacks to dump all domain hashes (secretsdump.py), and obtaining remote shells (psexec.py,wmiexec.py). - [METADATA_POISONING]: There is a discrepancy in the author metadata. The
SKILL.mdfrontmatter identifies the author as 'mahipal', whereas theLICENSEfile attributes copyright to 'mukul975'. This inconsistency can be a sign of deceptive intent or improper attribution. - [COMMAND_EXECUTION]: In
scripts/agent.py, thecheck_patch_statusfunction interpolates the user-provideddc_ipdirectly into a command list forwmic. Whileshell=Trueis not used, the lack of input validation for the IP address parameter represents a poor security practice when interfacing with system-level utilities. - [INDIRECT_PROMPT_INJECTION]: The skill possesses an attack surface for indirect injection as it ingests untrusted network-related data (IP addresses and hostnames) and uses them to drive subprocess executions without boundary markers or explicit sanitization logic.
Audit Metadata