performing-active-directory-forest-trust-attack

Fail

Audited by Socket on Mar 15, 2026

2 alerts found:

SecurityObfuscated File
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the dependency provenance is mostly consistent and there is no obvious credential-harvesting or third-party exfiltration path, but the skill’s core function is to give an AI agent offensive Active Directory trust-audit/attack capability against real domain infrastructure. This makes it high security risk even without clear malware indicators.

Confidence: 90%Severity: 84%
Obfuscated FileHIGH
references/api-reference.md

This code is a dual-use AD auditing/offensive tool that enumerates forest trusts and resolves cross-forest SIDs via LDAP and LSAT MSRPC calls. It does not present obvious signs of hidden backdoors or obfuscation in the provided fragment, but it performs powerful, sensitive operations that can be abused to facilitate lateral movement and privilege escalation. Treat as high-risk for inclusion in general-purpose dependencies: restrict usage to controlled environments, avoid passing plaintext credentials via CLI, and ensure output reports are stored/transmitted securely. Consider additional safeguards (credential prompting, ephemeral credentials, strict logging controls, and code review) before deployment.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 15, 2026, 10:51 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fperforming-active-directory-forest-trust-attack%2F@b4ac35cb9facb23e9c79b861264772f92d4eabc6