skills/mukul975/anthropic-cybersecurity-skills/performing-active-directory-penetration-test/Gen Agent Trust Hub
performing-active-directory-penetration-test
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The automation scripts
scripts/agent.pyandscripts/process.pyexecute external security utilities such asimpacket,netexec, andcertipyvia thesubprocessmodule. These calls use argument lists rather than shell strings, which is a standard and safer method for programmatically running system commands. - [EXTERNAL_DOWNLOADS]: The skill relies on several external Python libraries and system utilities, including
ldap3,impacket,bloodhound-python, andcertipy. The documentation provides instructions for users to install these dependencies from standard package registries. - [CREDENTIALS_UNSAFE]: The
SKILL.mdfile and scripts contain hardcoded example credentials (e.g.,Password123,EvilPass123,WebPass123). These are clearly identified as documentation placeholders for instructional purposes and are not functional secrets or production credentials. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection via data processed from the network environment.
- Ingestion points: The scripts
scripts/agent.pyandscripts/process.pyingest data from Active Directory via LDAP queries and the standard output of network scanning tools. - Boundary markers: The scripts do not implement explicit boundary markers or instruction-ignoring delimiters for ingested network data.
- Capability inventory: The skill includes capabilities for executing system commands (
subprocess.run), writing to the file system, and performing network operations. - Sanitization: Basic string parsing is performed to extract information (e.g., splitting lines and whitespace), but no robust validation or sanitization is implemented for content retrieved from the target environment.
Audit Metadata