skills/mukul975/anthropic-cybersecurity-skills/exploiting-nopac-cve-2021-42278-42287/Gen Agent Trust Hub
exploiting-nopac-cve-2021-42278-42287
Fail
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyusessubprocess.check_outputto execute various system tools includingnoPac.py,powershell.exe, andwmic.exe. While these are part of the skill's intended functionality for security testing, the execution of shell commands with variable parameters increases the attack surface. - [DYNAMIC_EXECUTION]: In
scripts/process.py, the functioncheck_machine_account_quotaconstructs a multi-line Python script as a string using an f-string and executes it viasubprocess.run(['python3', '-c', ...]). This method of dynamic code generation and execution is a risky practice as it bypasses standard module loading and makes the execution flow harder to audit. - [COMMAND_EXECUTION]: The dynamic Python script construction in
scripts/process.pydirectly interpolates variables like{domain},{username}, and{password}into the script string. Because these variables are not sanitized or escaped, an attacker or a user with a specially crafted password (e.g., containing single quotes and Python commands) could achieve arbitrary code execution on the host machine running the script. - [REMOTE_CODE_EXECUTION]: The skill documentation and error messages in
scripts/process.pyencourage the user to download and run external scripts from third-party GitHub repositories (e.g.,github.com/cube0x0/noPac). Executing unverified code from external sources is a significant security risk.
Recommendations
- AI detected serious security threats
Audit Metadata