exploiting-nopac-cve-2021-42278-42287
Fail
Audited by Snyk on Apr 8, 2026
Risk Level: CRITICAL
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt repeatedly shows and requires embedding plaintext credentials in command-line arguments and scripts (e.g., domain.local/user:'Password123', domain.local/'DC01':'AttackPass123'), so an agent following it would need to handle and output secret values verbatim.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content is an explicit, ready-to-run exploitation guide and toolset that instructs how to abuse CVE-2021-42278/42287 to escalate a normal domain user to Domain Admin, obtain Domain Controller tickets, perform DCSync and dump credentials (including KRBTGT), and spawn shells on DCs—functionality that directly enables credential theft and full domain compromise.
Issues (2)
W007
HIGHInsecure credential handling detected in skill instructions.
E006
CRITICALMalicious code pattern detected in skill scripts.
Audit Metadata