skills/mukul975/anthropic-cybersecurity-skills/exploiting-active-directory-certificate-services-esc1/Gen Agent Trust Hub
exploiting-active-directory-certificate-services-esc1
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizes thesubprocessmodule to executecertutilandcertipyfor discovering and analyzing certificate templates. The usage is restricted to list-based arguments, which is a secure implementation.\n- [COMMAND_EXECUTION]: The skill provides detailed workflows and commands for utilizing third-party security tools such asmimikatz,Rubeus, andsecretsdump.py. These are used for credential extraction and privilege escalation as part of the intended red-teaming methodology.\n- [EXTERNAL_DOWNLOADS]: The documentation references the installation of thePSPKIPowerShell module from the public PowerShell Gallery. This is a standard dependency for Active Directory certificate auditing.\n- [PROMPT_INJECTION]: The skill processes output from external system tools (certutil, certipy) inscripts/agent.pyandscripts/process.py. While no boundary markers are used, the risk is negligible as the data is parsed from trusted system utilities during authorized assessments.
Audit Metadata