exploiting-active-directory-certificate-services-esc1

Pass

Audited by Gen Agent Trust Hub on Mar 15, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The script scripts/agent.py utilizes the subprocess module to execute certutil and certipy for discovering and analyzing certificate templates. The usage is restricted to list-based arguments, which is a secure implementation.\n- [COMMAND_EXECUTION]: The skill provides detailed workflows and commands for utilizing third-party security tools such as mimikatz, Rubeus, and secretsdump.py. These are used for credential extraction and privilege escalation as part of the intended red-teaming methodology.\n- [EXTERNAL_DOWNLOADS]: The documentation references the installation of the PSPKI PowerShell module from the public PowerShell Gallery. This is a standard dependency for Active Directory certificate auditing.\n- [PROMPT_INJECTION]: The skill processes output from external system tools (certutil, certipy) in scripts/agent.py and scripts/process.py. While no boundary markers are used, the risk is negligible as the data is parsed from trusted system utilities during authorized assessments.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 15, 2026, 01:29 PM