copyfail-go-lpe
Fail
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill provides instructions to fetch prebuilt exploit binaries from an untrusted external repository (
github.com/badsectorlabs/copyfail-go). - [REMOTE_CODE_EXECUTION]: It details a workflow where an opaque binary from an external, untrusted source is downloaded, granted execution permissions (
chmod +x), and then executed locally. This pattern represents a significant risk of arbitrary code execution from a third party. - [COMMAND_EXECUTION]: The skill facilitates the execution of a privilege escalation exploit. This involves high-risk activities including the manipulation of the
/usr/bin/susetuid binary and the spawning of an unauthorized root shell. - [COMMAND_EXECUTION]: Instructions include the installation of arbitrary system-level packages (
nasm,binutils-aarch64-linux-gnu, etc.) to facilitate building malicious payloads from source.
Recommendations
- AI detected serious security threats
Audit Metadata