Performs authorized post-exploitation activities to assess impact, lateral movement paths, credential exposure, and detection gaps after initial compromise. Use when a foothold has been validated and the test requires controlled impact expansion analysis.
90
85%
Does it follow best practices?
Impact
100%
1.63xAverage score across 3 eval scenarios
Advisory
Suggest reviewing before use
Run post-exploitation tasks only after explicit approval for this phase. Keep actions controlled, reversible, and auditable. Avoid destructive changes and unnecessary access to sensitive data.
# Post-Exploitation Output
## Initial Context
- Entry point:
- Starting privilege:
- Scope constraints:
## Escalation and Movement Findings
- Finding:
- Preconditions:
- Evidence:
- Result:
- Impact:
## Credential and Data Exposure
- Exposure path:
- Affected assets/data:
- Business risk:
## Detection and Response
- Alerts observed:
- Time to detect:
- Time to contain:
- Gaps:
## Cleanup Verification
- Artifacts removed:
- Validation notes:a8ff73a
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.