conducting-internal-network-penetration-test

Pass

Audited by Gen Agent Trust Hub on Apr 9, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses automation scripts to perform network security tasks.
  • Evidence: scripts/agent.py and scripts/process.py utilize subprocess.run to execute CLI tools such as nmap, netexec, and bloodhound-python.
  • Analysis: The commands are constructed using argument lists rather than shell strings, which follows security best practices to prevent command injection. This execution is central to the skill's stated purpose of automating penetration testing workflows.
  • [EXTERNAL_DOWNLOADS]: The skill references established cybersecurity libraries.
  • Evidence: references/api-reference.md lists ldap3, impacket, and python-nmap as required libraries.
  • Analysis: These are well-known, industry-standard tools for security auditing and are referenced from official package registries.
  • [CREDENTIALS_UNSAFE]: The documentation includes placeholder credentials for illustrative purposes.
  • Evidence: SKILL.md and scripts contain example strings such as 'Password123', 'AdminPass123', and 'DaPass123'.
  • Analysis: These are clearly marked as example data for use in a controlled lab environment (e.g., corp.local) and do not constitute the exposure of real secrets or hardcoded credentials.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 9, 2026, 09:44 AM