exploiting-nopac-cve-2021-42278-42287

Fail

Audited by Socket on Apr 8, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

This skill is internally consistent with its stated purpose, but that purpose is to give an AI agent end-to-end offensive AD exploitation and credential-dumping capability. The main risk is not deceptive behavior; it is the explicit enablement of privilege escalation, DCSync, and use of unpinned third-party exploit tooling with sensitive credentials. Classify as suspicious/high-risk offensive capability rather than confirmed malware.

Confidence: 95%Severity: 95%
MalwareHIGH
references/workflows.md

This fragment is a high-risk offensive playbook describing concrete steps to impersonate domain controllers, harvest AD credentials (including KRBTGT), and achieve persistent Golden Ticket access. The document should be treated as potentially malicious or dual-use: do not include in public/production dependencies, restrict distribution to authorized red-team/defensive contexts with legal authorization, and flag repositories containing this text for security review and access controls.

Confidence: 75%Severity: 95%
Audit Metadata
Analyzed At
Apr 8, 2026, 12:01 AM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fexploiting-nopac-cve-2021-42278-42287%2F@995e23db95ca8cfb58ea49fc2c0f82397eaf2452