exploiting-nopac-cve-2021-42278-42287

Fail

Audited by Snyk on Apr 8, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt repeatedly shows and requires embedding plaintext credentials in command-line arguments and scripts (e.g., domain.local/user:'Password123', domain.local/'DC01':'AttackPass123'), so an agent following it would need to handle and output secret values verbatim.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content is an explicit, ready-to-run exploitation guide and toolset that instructs how to abuse CVE-2021-42278/42287 to escalate a normal domain user to Domain Admin, obtain Domain Controller tickets, perform DCSync and dump credentials (including KRBTGT), and spawn shells on DCs—functionality that directly enables credential theft and full domain compromise.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 8, 2026, 12:00 AM
Issues
2