performing-active-directory-penetration-test

Warn

Audited by Socket on Apr 6, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
scripts/process.py

This script is an offensive AD pentest automation tool that shells out to known offensive utilities (impacket, bloodhound-python, certipy, netexec). The code itself does not implement hidden backdoors or network exfiltration, but it handles credentials insecurely (passing them on command line) and will perform sensitive and potentially destructive AD enumeration and hash collection when run with valid credentials. It is dual-use: legitimate for authorized security testing, but dangerous if used by unauthorized actors. Recommend auditing usage, avoiding passing plaintext credentials on command-line (use more secure methods supported by tools), and restrict execution to authorized personnel and environments.

Confidence: 90%Severity: 65%
SecurityMEDIUM
SKILL.md

High-risk offensive security skill. Its capabilities are aligned with its stated AD penetration-testing purpose, but that purpose itself grants an AI agent explicit exploit, credential-extraction, privilege-escalation, and persistence behavior against Active Directory environments. No clear third-party exfiltration or stealth is shown, so this is better classified as dangerous/vulnerable rather than confirmed malware.

Confidence: 95%Severity: 94%
Audit Metadata
Analyzed At
Apr 6, 2026, 01:39 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fperforming-active-directory-penetration-test%2F@980d25cbe02fda2c2dea4ea1303c861b6834f276