skills/mukul975/anthropic-cybersecurity-skills/conducting-internal-network-penetration-test/Gen Agent Trust Hub
conducting-internal-network-penetration-test
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses automation scripts to perform network security tasks.
- Evidence:
scripts/agent.pyandscripts/process.pyutilizesubprocess.runto execute CLI tools such asnmap,netexec, andbloodhound-python. - Analysis: The commands are constructed using argument lists rather than shell strings, which follows security best practices to prevent command injection. This execution is central to the skill's stated purpose of automating penetration testing workflows.
- [EXTERNAL_DOWNLOADS]: The skill references established cybersecurity libraries.
- Evidence:
references/api-reference.mdlistsldap3,impacket, andpython-nmapas required libraries. - Analysis: These are well-known, industry-standard tools for security auditing and are referenced from official package registries.
- [CREDENTIALS_UNSAFE]: The documentation includes placeholder credentials for illustrative purposes.
- Evidence:
SKILL.mdand scripts contain example strings such as 'Password123', 'AdminPass123', and 'DaPass123'. - Analysis: These are clearly marked as example data for use in a controlled lab environment (e.g.,
corp.local) and do not constitute the exposure of real secrets or hardcoded credentials.
Audit Metadata