Provide comprehensive techniques for attacking Microsoft Active Directory environments. Covers reconnaissance, credential harvesting, Kerberos attacks, lateral movement, privilege escalation, and domain dominance for red team operations and penetration testing.
81
77%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Critical
Do not install without reviewing
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/antigravity-active-directory-attacks/SKILL.mdQuality
Discovery
82%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a strong description with excellent specificity and domain-relevant trigger terms that a security professional would naturally use. Its main weakness is the absence of an explicit 'Use when...' clause, which would help Claude know precisely when to select this skill. The description is well-scoped to a clear niche with minimal conflict risk.
Suggestions
Add an explicit 'Use when...' clause, e.g., 'Use when the user asks about attacking Active Directory, AD exploitation, red teaming Windows domains, or pentesting AD environments.'
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: reconnaissance, credential harvesting, Kerberos attacks, lateral movement, privilege escalation, and domain dominance. These are well-defined, specific categories of activity. | 3 / 3 |
Completeness | Clearly answers 'what does this do' with the list of attack techniques, but lacks an explicit 'Use when...' clause. The context of red team/pentesting is mentioned but not framed as trigger guidance. Per rubric guidelines, missing 'Use when' caps completeness at 2. | 2 / 3 |
Trigger Term Quality | Includes strong natural keywords users would say: 'Active Directory', 'Kerberos attacks', 'lateral movement', 'privilege escalation', 'credential harvesting', 'red team', 'penetration testing', 'domain dominance', 'reconnaissance'. These cover the terms a security professional would naturally use. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive with a clear niche: Microsoft Active Directory attack techniques for red team operations. The combination of AD-specific terminology (Kerberos, domain dominance) and offensive security context makes it very unlikely to conflict with other skills. | 3 / 3 |
Total | 11 / 12 Passed |
Implementation
72%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a well-structured, highly actionable skill with executable commands for every technique covered. Its main weaknesses are some redundancy (Quick Reference table duplicating earlier content, boilerplate sections) and insufficient validation checkpoints integrated into the workflows, particularly for destructive operations like ZeroLogon and DCSync. The progressive disclosure is handled well with advanced topics properly deferred to a reference file.
Suggestions
Integrate validation checkpoints directly into multi-step workflows (e.g., 'Verify DCSync rights before attempting: crackmapexec ldap ... --check-replication-rights') rather than listing constraints separately at the end.
Remove the Quick Reference table since it duplicates commands already shown in detail, or remove the detailed sections and keep only the quick reference to reduce token usage.
Remove the boilerplate 'When to Use' section and the Outputs/Deliverables list, which add no actionable value for Claude.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is mostly efficient with concrete commands, but includes some unnecessary sections like the Inputs/Prerequisites and Outputs/Deliverables lists that Claude doesn't need spelled out, the 'When to Use' boilerplate at the end, and the Essential Tools table which largely duplicates information shown in the commands themselves. The Quick Reference table also duplicates commands already shown in detail above. | 2 / 3 |
Actionability | Excellent actionability throughout - nearly every technique includes fully executable, copy-paste ready commands with specific tool invocations, flags, and argument patterns. Multiple tool alternatives are provided for each attack type, and commands include realistic placeholder values that make adaptation straightforward. | 3 / 3 |
Workflow Clarity | The core workflow has numbered steps and the examples show sequential attack chains, but validation checkpoints are largely missing. For destructive operations like ZeroLogon exploitation, the password restore step is mentioned but there's no explicit 'verify before proceeding' checkpoint. The Constraints section lists some safety measures but they're separated from the workflow rather than integrated as validation gates. | 2 / 3 |
Progressive Disclosure | Content is well-organized with clear section headers, a logical progression from reconnaissance through exploitation, and advanced techniques appropriately deferred to a single referenced file (references/advanced-attacks.md). The main skill covers core techniques at appropriate depth without becoming monolithic, and the reference is one level deep with clear signaling. | 3 / 3 |
Total | 10 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 10 / 11 Passed | |
353f6a8
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.