skills/mukul975/anthropic-cybersecurity-skills/exploiting-active-directory-certificate-services-esc1/Gen Agent Trust Hub
exploiting-active-directory-certificate-services-esc1
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizessubprocess.check_outputto execute system utilities (certutil) and external security tools (certipy). This functionality is intended to automate the discovery of vulnerable certificate templates within an Active Directory environment. The commands are constructed using argument lists, which prevents shell injection vulnerabilities. - [CREDENTIALS_UNSAFE]: The
scripts/agent.pyscript accepts Active Directory domain credentials (username and password) as command-line arguments. While this is a standard operational requirement for the tool's intended use in security auditing, it presents a minor risk as credentials may be visible in process listings or command history if not handled carefully by the user. - [PRIVILEGE_ESCALATION]: The skill documentation and associated workflows (found in
SKILL.mdandreferences/workflows.md) describe methods for escalating domain privileges to Domain Admin level. These instructions are presented as part of a legitimate red-teaming exercise framework and are supported by detection signatures and remediation guidance.
Audit Metadata