skills/mukul975/anthropic-cybersecurity-skills/performing-active-directory-penetration-test/Gen Agent Trust Hub
performing-active-directory-penetration-test
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The automation scripts
agent.pyandprocess.pyutilize thesubprocessmodule to execute external security tools likenetexec,impacket,bloodhound-python, andcertipy. These calls use argument lists which prevent shell injection vulnerabilities. - [EXTERNAL_DOWNLOADS]: The skill documentation and scripts reference several well-known security repositories and Python packages (e.g.,
ldap3,impacket,bloodhound-python). These are recognized industry-standard tools used for legitimate security auditing and are documented neutrally. - [DATA_EXPOSURE]: While the skill demonstrates techniques for credential harvesting such as DCSync and Kerberoasting, it does so within the context of an authorized penetration test. No actual sensitive data or hardcoded credentials for real systems were found; all passwords provided in the text are generic placeholders used for laboratory examples.
- [PROMPT_INJECTION]: The skill processes data extracted from Active Directory environments. While this presents a theoretical attack surface for indirect injection via AD attributes, the scripts handle this data as strings for reporting purposes, and no logic was found that would allow the processed data to influence the agent's core instruction set.
- [SAFE]: A comprehensive review of the provided code and documentation reveals no malicious patterns, obfuscation, or unauthorized network activity. The skill's behavior is consistent with its stated objective of providing a penetration testing framework.
Audit Metadata