ad-acl-abuse

Fail

Audited by Snyk on May 8, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill includes numerous CLI and tool examples that embed plaintext credentials and secrets directly (e.g., DOMAIN/user:pass, -U 'user%pass', -p pass, -pfx-pass PASS, FakeP@ss), which requires the LLM/agent to place secret values verbatim into commands and outputs, creating a high exfiltration risk.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This is an explicit offensive playbook: it provides step‑by‑step, actionable instructions and tool commands to enumerate and abuse AD ACLs for credential theft (DCSync/secretsdump, LAPS, NT hashes), privilege escalation to Domain Admins (WriteDACL/WriteOwner/GenericAll chains, RBCD, Shadow Credentials), remote code execution and persistence (GPO abuse, creating machine accounts, adding group members), and OPSEC/cleanup guidance — i.e., clearly malicious and intended for abuse.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

Audit Metadata
Risk Level
CRITICAL
Analyzed
May 8, 2026, 03:43 AM
Issues
2