Performs authorized post-exploitation activities to assess impact, lateral movement paths, credential exposure, and detection gaps after initial compromise. Use when a foothold has been validated and the test requires controlled impact expansion analysis.
90
85%
Does it follow best practices?
Impact
100%
1.63xAverage score across 3 eval scenarios
Advisory
Suggest reviewing before use
Post-exploitation report template structure
Top-level heading
0%
100%
Initial Context section
0%
100%
Entry point field
0%
100%
Starting privilege field
0%
100%
Scope constraints field
0%
100%
Escalation section
0%
100%
Escalation sub-fields
0%
100%
Credential exposure section
0%
100%
Detection section
60%
100%
Cleanup section
100%
100%
Privileges documented
0%
100%
Reachable assets noted
0%
100%
Findings map to business impact
100%
100%
Actions within approved scope
100%
100%
Phase boundary and defense visibility documentation
Allowed techniques listed
100%
100%
Prohibited actions listed
100%
100%
Stop conditions stated
100%
100%
Approved systems documented
100%
100%
Time window documented
100%
100%
Baseline telemetry noted
100%
100%
Alerts observed field
75%
100%
Time to detect field
75%
100%
Time to contain field
62%
100%
Detection gaps field
87%
100%
Artifacts removed field
75%
100%
Validation notes field
75%
100%
Actions within boundaries
100%
100%
Credential exposure and business impact mapping
Credential exposure section present
0%
100%
Exposure path field
0%
100%
Affected assets/data field
0%
100%
Business risk field
55%
100%
Technical-to-business mapping
100%
100%
No real credentials in report
100%
100%
Lateral movement via trusts
100%
100%
Reproducibility without sensitive data
88%
100%
Credential access and reuse assessed
77%
100%
Data access paths documented
100%
100%
Cleanup section present
100%
100%
Actions within scope
100%
100%
a8ff73a
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.