skills/mukul975/anthropic-cybersecurity-skills/hunting-for-unusual-service-installations/Gen Agent Trust Hub
hunting-for-unusual-service-installations
Pass
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: The skill correctly implements threat hunting logic for MITRE ATT&CK technique T1543.003 (Windows Service) by parsing System event logs for Event ID 7045. It identifies suspicious patterns such as temp directory paths, encoded PowerShell commands, and LOLBins.
- [SAFE]: No network communication, exfiltration, or credential harvesting patterns were detected. The script processes .evtx files locally and outputs analysis results to the console.
- [SAFE]: The Python script uses standard libraries (
python-evtx,lxml) for its intended purpose. No evidence of obfuscation, dynamic code execution (eval/exec), or command injection was found. - [SAFE]: There are no signs of prompt injection or malicious instructions in the metadata or documentation. The skill's stated purpose matches its technical implementation.
Audit Metadata