exploiting-active-directory-certificate-services-esc1

Fail

Audited by Socket on Apr 7, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

This skill is not covert malware, but it is a high-risk offensive security skill. Its capabilities are consistent with its stated red-team purpose, yet that purpose is to weaponize AD CS misconfigurations for privilege escalation, ticket abuse, and credential dumping; such functionality is inherently dangerous for an AI agent and unsuitable outside tightly controlled authorized environments.

Confidence: 95%Severity: 93%
MalwareHIGH
references/workflows.md

This is an explicit exploitation playbook describing how to abuse AD CS (ESC1) misconfigurations to obtain privileged domain credentials and perform DCSync/credential dumping. It is actionable and high-risk if used against production environments. Use of these steps constitutes offensive activity unless performed under authorized testing. Recommend treating packages or automation implementing these steps as malicious or high-risk in untrusted contexts and only use in authorized labs with consent.

Confidence: 90%Severity: 95%
Audit Metadata
Analyzed At
Apr 7, 2026, 06:50 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fexploiting-active-directory-certificate-services-esc1%2F@e43b22476e15c18d0efc66880dc2143ebc2259d0