skills/mukul975/anthropic-cybersecurity-skills/extracting-credentials-from-memory-dump/Gen Agent Trust Hub
extracting-credentials-from-memory-dump
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyand the instructions inSKILL.mdusesubprocess.runto execute external forensic tools such asvol(Volatility 3) andpypykatz. These commands are used for legitimate process analysis and credential extraction within a forensic workflow and are implemented using secure coding practices (argument lists). - [EXTERNAL_DOWNLOADS]: The skill instructs the user to install well-known cybersecurity packages (
volatility3,pypykatz) viapip. These tools are recognized in the incident response industry and are fetched from standard package registries. - [PROMPT_INJECTION]: The skill exhibits a potential surface for indirect prompt injection as it parses untrusted data from memory dumps (e.g., usernames, domain names, and strings) and incorporates them into its report. However, this is inherent to forensics tools.
- Ingestion points: Raw memory dump files (
memory.raw) and extracted LSASS memory maps processed inscripts/agent.py. - Boundary markers: Absent; extracted forensic data is printed directly to stdout and saved to JSON without specific LLM-targeted delimiters.
- Capability inventory: The script has
subprocess.runcapabilities to invoke system tools. - Sanitization: Extracted credential fragments are truncated to 30-60 characters in
scripts/agent.pybefore being added to reports, which serves as a basic filter for large-scale injection payloads. - [DATA_EXFILTRATION]: The skill extracts and aggregates sensitive authentication data (NTLM hashes, Kerberos tickets, API keys) into a local file (
credential_report.json). This behavior is the core intended functionality of the tool for forensic analysis. No network operations or external data transfer mechanisms were detected in the scripts.
Audit Metadata