skills/mukul975/anthropic-cybersecurity-skills/performing-deception-technology-deployment/Gen Agent Trust Hub
performing-deception-technology-deployment
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [SAFE]: The skill is designed for legitimate cybersecurity operations, specifically the deployment of deception assets.
- [DATA_EXFILTRATION]: While the skill references sensitive file paths (e.g., .aws/credentials) and creates credentials, these are explicitly labeled as honeytokens (decoy data) intended to trigger alerts when accessed by attackers. No actual sensitive data is leaked.
- [COMMAND_EXECUTION]: The skill uses administrative PowerShell commands (New-ADUser, Add-ADGroupMember) and shell commands (cmdkey), but these are restricted to the intended purpose of creating decoy accounts and cached credentials in a controlled environment.
- [REMOTE_CODE_EXECUTION]: Code examples use the requests library to interact with well-known security services like Thinkst Canary and Canarytokens.org, which is standard for the described workflow.
- [SAFE]: The HTTP honeypot script in agent.py ingests external data (HTTP headers and bodies) which is the primary function of a honeypot, and the script merely logs these interactions.
Audit Metadata