exploiting-smb-vulnerabilities-with-metasploit
Audited by Snyk on Mar 15, 2026
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt includes plaintext passwords and NTLM hashes embedded directly in example commands and module settings (e.g., -p 'TestPass123', -H , set SMBPass ...), which requires the agent to output secret values verbatim.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This skill explicitly documents and instructs deliberate offensive actions — remote code execution (Meterpreter reverse shells, psexec), credential theft (hashdump, Responder, NTLM relay, pass‑the‑hash), and lateral movement — which are high-risk malicious behaviors if used outside an authorized test scope.
HIGH W008: Secret detected in skill content (API keys, tokens, passwords).
- Secret detected (high risk: 1.00). I scanned for high-entropy, directly usable credential material. The document contains NTLM password hash values in multiple places:
- The hashdump output line: "Administrator:500:aad3b435b51404eeaad3b435b51404ee:e19ccf75ee54e06b06a5907af13cef42:::"
- The shortened/individual hashes used elsewhere: "aad3b435b51404eeaad3b435b51404ee:e19ccf75ee54e06b06a5907af13cef42" and "e19ccf75ee54e06b06a5907af13cef42"
These are high-entropy NTLM hashes and are shown being used with pass-the-hash / psexec / crackmapexec commands, so they are directly usable credentials (i.e., meet the definition of a secret).
I ignored low-entropy/example values such as 'TestPass123' (simple example password), IPs/ports, and placeholder tokens like "", since those fit the "setup/example/placeholder" rules.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs running privileged local commands (e.g., "sudo impacket-ntlmrelayx", "sudo responder"), starting services/listeners and executing exploits from the agent's host—actions that require elevated privileges and modify the host's state—so it pushes the agent to perform state-changing, potentially harmful operations.
Issues (4)
Insecure credential handling detected in skill instructions.
Malicious code pattern detected in skill scripts.
Secret detected in skill content (API keys, tokens, passwords).
Attempt to modify system services in skill instructions.