skills/mukul975/anthropic-cybersecurity-skills/exploiting-kerberoasting-with-impacket/Gen Agent Trust Hub
exploiting-kerberoasting-with-impacket
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [DATA_EXPOSURE_EXFILTRATION]: The skill focuses on extracting Kerberos TGS (Ticket Granting Service) hashes from Active Directory service accounts. These hashes are sensitive authentication materials that can be cracked offline. Evidence found in
SKILL.md(Step 2: Request TGS Tickets) andscripts/agent.pyin therun_getuserspnsfunction. - [UNVERIFIABLE_DEPENDENCIES_RCE]: The skill requires the installation of the
impacketlibrary from external package registries. It uses thesubprocessmodule inscripts/agent.pyto execute command-line tools likeGetUserSPNs.pyandhashcatwith parameters provided during runtime. - [METADATA_POISONING]: There is an inconsistency in the author metadata;
SKILL.mdattributes the work to 'mahipal', while the license and system configuration refer to 'mukul975'. - [INDIRECT_PROMPT_INJECTION]: The
scripts/process.pytool ingests Windows Event Logs (Event ID 4769) to detect attacks. Maliciously crafted data within these logs could potentially influence the agent's interpretation of the system state. - Ingestion points:
scripts/process.py(line 62) via theparse_event_logmethod. - Boundary markers: No delimiters or safety instructions are used when processing the ingested log data.
- Capability inventory: The skill includes the ability to execute system commands and perform network operations via wrapped tools in
scripts/agent.py. - Sanitization: The log parsing logic lacks validation or sanitization of the values extracted from the
EventDatafields.
Audit Metadata