skills/mukul975/anthropic-cybersecurity-skills/configuring-ldap-security-hardening/Gen Agent Trust Hub
configuring-ldap-security-hardening
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill requires the
ldap3Python library, which is a standard and well-known package for LDAP interactions. It is referenced inscripts/agent.pyand documentation. - [COMMAND_EXECUTION]: The
scripts/agent.pytool performs network operations to connect to LDAP servers on ports 389 and 636. These operations are restricted to auditing security configurations and do not involve arbitrary command execution or shell injection. - [DATA_EXFILTRATION]: No evidence of unauthorized data transmission was found. The script processes credentials (username and password) only when provided by the user via command-line arguments for authentication tests. It does not access sensitive local files or hardcoded secrets.
- [INDIRECT_PROMPT_INJECTION]: The script ingests data from LDAP server responses (e.g.,
rootDSEand user object counts). - Ingestion points: LDAP search results in
scripts/agent.py(e.g.,conn.entries). - Boundary markers: Not applicable, as the data is used for diagnostic printing and not passed to an LLM or shell for execution.
- Capability inventory: The script is limited to network connections and file writing (JSON report).
- Sanitization: Output is printed directly to the console or serialized to JSON; no execution of remote data occurs.
Audit Metadata