extracting-credentials-from-memory-dump
Fail
Audited by Snyk on Apr 6, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt explicitly instructs extracting secrets (passwords, NTLM hashes, Kerberos tickets, API keys) from memory dumps and printing/saving them verbatim in console outputs and reports (including example API key fragments like AKIA...), requiring the agent to handle and output secret values directly.
HIGH W008: Secret detected in skill content (API keys, tokens, passwords).
- Secret detected (high risk: 1.00). I scanned the full prompt for literal, high-entropy values that appear to be usable credentials.
Flagged (real/usable credential artifacts):
- NTLM/LM hash values shown in the volatility/hashdump output:
- aad3b435b51404eeaad3b435b51404ee
- fc525c9683e8fe067095ba2ddc971889
- 31d6cfe0d16ae931b73c59d7e0c089c0
- 2b576acbe6bcfda7294d6bd18041b8fe These are concrete hash values (NTLM/LM) that can be used in pass-the-hash or cracking workflows and therefore meet the “secret” definition.
Ignored (not flagged) and why:
- “AKIA...” occurrences and “AKIA...” in recommendations — truncated/redacted (ellipsis) and therefore not a full key.
- “DPAPI Master Key: {mk[:40]}...” — redacted/truncated output.
- Generic placeholders and environment variable names (none with actual values present) and example/test strings in code blocks — treated as documentation examples and ignored per the rules.
- Non-secret artifacts (PIDs, file paths, plugin names, descriptive text) — not credentials.
Note: Some listed hash values (e.g., aad3b43... and 31d6cfe...) are well-known placeholder/empty-hash constants in Windows outputs, but they are literal hash values in the document and represent credential artifacts; thus I flagged the hash block as containing secrets.
Issues (2)
W007
HIGHInsecure credential handling detected in skill instructions.
W008
HIGHSecret detected in skill content (API keys, tokens, passwords).
Audit Metadata