cve-2026-31431-copy-fail

Fail

Audited by Snyk on Apr 30, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.80). These are legitimate-looking security-research sites (a blog and a GitHub repo) rather than obfuscated download hosts, but the GitHub repo contains a proof‑of‑concept local‑privilege‑escalation exploit — so while not classic malware-distribution infrastructure, downloading or running the code is high‑risk.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This code is an explicit local privilege escalation toolkit: it intentionally corrupts the page-cache view of /etc/passwd (via the algif_aead splice bug) to change a user's UID to 0 and can spawn a root shell, i.e., deliberate system-compromise behavior for gaining unauthorized root access.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The Installation section instructs to "git clone https://github.com/rootsecdev/cve_2026_31431.git" and then run the included Python scripts, so that remote repository is fetched and its code is executed—constituting a runtime fetch of remote code that will be executed.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill contains exploit code that intentionally modifies the /etc/passwd page-cache to escalate privileges (and includes commands that use sudo to change kernel module state), which directly compromises the machine's state and attempts local privilege escalation.

Issues (4)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 30, 2026, 09:28 PM
Issues
4