GitHub:sickn33/antigravity-awesome-skills · active-directory-attacks
Use Caution
This skill provides techniques for attacking Microsoft Active Directory environments, covering reconnaissance, credential harvesting, and privilege escalation.
Source: Workspace import
Originally ingested from a local workspace copy.
version cb7b0600b7de
4 findings
OpenClaw disconnected clean
runtime tested
openclaw disconnected clean
no human review yet
Runtime evidence: OpenClaw disconnected runtime validation completed cleanly in the isolated runner.
Used fake placeholder env vars in the sandbox; no real credentials were exposed.
Automated result: Use Caution
Current public label: Use Caution
The current label should account for both the file-level review and the fact that the sandbox runtime pass did not come back perfectly clean.
Human review: none yet
The current public label is still relying on automation. A human has not weighed in yet.
Severity mix: 3 low, 1 info