ad-acl-abuse

Fail

Audited by Socket on May 8, 2026

1 alert found:

Malware
MalwareHIGH
references/shadow-creds-rbcd.md

High confidence malicious intent: the provided content is an actionable offensive playbook enabling unauthorized AD privilege escalation, Kerberos ticket abuse, remote execution, and credential dumping, along with OPSEC-focused cleanup. As such, if this fragment were included in a distributed software artifact, it would represent a severe security risk. This is not a normal code dependency to audit for supply-chain malware; the risk is the presence of harmful exploitation instructions/content itself.

Confidence: 78%Severity: 100%
Audit Metadata
Analyzed At
May 8, 2026, 03:43 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fad-acl-abuse%2F@8cfc79d9783b844f79cbee2a23fadb5811935dab