active-directory-certificate-services

Warn

Audited by Socket on Apr 9, 2026

2 alerts found:

Securityx2
SecurityMEDIUM
ADCS_ESC_MATRIX.md

This fragment is not executable malware, but it is highly actionable offensive security guidance for exploiting AD CS ESC1–ESC13 paths (certificate abuse, CA/template configuration manipulation, and NTLM relay/coercion integration), with concrete commands and detection/remediation mappings. As a supply-chain artifact, its primary risk is enabling real-world intrusion and privilege escalation rather than containing in-code malicious behavior.

Confidence: 82%Severity: 86%
SecurityMEDIUM
SKILL.md

This skill is not covert malware, but it is a high-risk offensive security capability set fundamentally aimed at exploiting AD CS for privilege escalation, relay, persistence, and certificate forgery. Its purpose and behavior are internally consistent, yet that purpose is inherently dangerous for an AI agent, and the related-skill loading further expands offensive scope.

Confidence: 94%Severity: 92%
Audit Metadata
Analyzed At
Apr 9, 2026, 01:13 PM
Package URL
pkg:socket/skills-sh/yaklang%2Fhack-skills%2Factive-directory-certificate-services%2F@a69d53187ca13f0bbd790e505afed640fb5662a8