red-team-tactics
Fail
Audited by Snyk on Mar 1, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content is a playbook that explicitly describes credential theft (Kerberoasting, AS-REP Roasting, DCSync), data exfiltration, C2/remote command channels, persistence and privilege escalation techniques, plus defense-evasion (LOLBins, timestomping, log clearing, obfuscation) — all clear indicators of deliberate malicious capabilities despite ethical caveats.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly describes and encourages techniques that alter system state—privilege escalation, modifying services/cron, timestomping and log clearing, and persistence—which can be used to obtain sudo, modify protected files, or otherwise compromise the host.
Audit Metadata