copyfail-go-lpe

Fail

Audited by Gen Agent Trust Hub on May 2, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill provides instructions to fetch prebuilt exploit binaries from an untrusted external repository (github.com/badsectorlabs/copyfail-go).
  • [REMOTE_CODE_EXECUTION]: It details a workflow where an opaque binary from an external, untrusted source is downloaded, granted execution permissions (chmod +x), and then executed locally. This pattern represents a significant risk of arbitrary code execution from a third party.
  • [COMMAND_EXECUTION]: The skill facilitates the execution of a privilege escalation exploit. This involves high-risk activities including the manipulation of the /usr/bin/su setuid binary and the spawning of an unauthorized root shell.
  • [COMMAND_EXECUTION]: Instructions include the installation of arbitrary system-level packages (nasm, binutils-aarch64-linux-gnu, etc.) to facilitate building malicious payloads from source.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
May 2, 2026, 01:41 AM