conducting-pass-the-ticket-attack
Fail
Audited by Snyk on Mar 15, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content is a clearly offensive toolkit and how‑to that intentionally instructs and automates credential theft (LSASS/Mimikatz/Rubeus), forging/injecting Kerberos tickets (golden/silver tickets), and lateral/remote execution (PsExec, WMI, copying payloads), all of which enable unauthorized access, privilege abuse, and persistence.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill explicitly instructs obtaining local admin privileges, dumping LSASS memory and injecting Kerberos tickets—actions that require elevated access and directly modify/authenticate system state, enabling compromise of the host.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata