analyzing-active-directory-acl-abuse

Warn

Audited by Socket on Apr 6, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
SKILL.md

SUSPICIOUS: The skill is internally consistent for AD ACL auditing and uses a normal PyPI dependency with direct LDAP/LDAPS data flows, so there is no strong sign of credential harvesting or malicious install behavior. However, it meaningfully equips an AI agent with offensive identity-security enumeration procedures for privilege-escalation path discovery, which makes it a high-risk dual-use cybersecurity skill.

Confidence: 89%Severity: 64%
SecurityMEDIUM
scripts/agent.py

This module is a dual-use Active Directory ACL abuse/reconnaissance tool. It binds to a specified domain controller using user-provided plaintext NTLM credentials, enumerates objects’ nTSecurityDescriptor ACLs, parses ACEs, and produces actionable JSON findings mapping dangerous AD permissions (e.g., GenericAll/WriteDACL/WriteOwner/GenericWrite) to known privilege-escalation attack paths. There is no direct malicious behavior like exploitation, persistence, or external exfiltration in the shown code, but its functionality meaningfully supports offensive AD intrusion workflows, making it security-sensitive. The code also introduces operational credential-handling risk by taking passwords via CLI.

Confidence: 70%Severity: 70%
Audit Metadata
Analyzed At
Apr 6, 2026, 06:47 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fanalyzing-active-directory-acl-abuse%2F@884c1c05979a40cc213f1cb5bfc3595d1463625b