Language:
In migration scenarios, administrators use the SID History mechanism, but attackers can exploit it to escalate their privileges.
You should remove dangerous values stored for migration purposes.
How to remove SID History with PowerShell
Security Considerations for Trusts
Name: Accounts With a Dangerous SID History Attribute
Codename: C-ACCOUNTS-DANG-SID-HISTORY
Severity: High
Tactics: TA0003, TA0008, TA0004, TA0001
Techniques: T1550