Windows Privilege Escalation

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Instruction to copy/paste content into terminal detected All findings: [CRITICAL] command_injection: Instruction to copy/paste content into terminal detected (CI012) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] command_injection: PowerShell execution detected (CI005) [AITech 9.1.4] This Skill is a practical, highly actionable offensive guide for Windows privilege escalation. It is aligned with its stated purpose (penetration testing) but contains multiple explicit exploitation recipes (credential dumping, service binary manipulation, AlwaysInstallElevated MSI install, token impersonation tools, reverse shells) that can be directly misused for unauthorized attacks. Risks include credential harvesting, network exfiltration to attacker-controlled hosts, and instructions that encourage downloading and running powerful third-party tools without guidance on trust. Treat this content as high-risk: appropriate only for authorized, controlled penetration tests with strict operational controls and verified tool sources. If used in any other context it is easily weaponizable. LLM verification: This skill is offensive by design: it provides explicit, actionable steps and commands to perform Windows privilege escalation (credential dumping, service hijacking, reverse shells, etc.). The capabilities match the stated purpose, so it is internally consistent, but the content is high-risk and easily abused. For supply-chain assessment: the document itself is not obfuscated and does not contain embedded malware binaries, but it prescribes using powerful dual-use tools and network exfiltration

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 01:11 PM
Package URL
pkg:socket/skills-sh/automindtechnologie-jpg%2Fultimate-skill.md%2Fwindows-privilege-escalation%2F@318d51914c03c51a560c6046db2d611f4f93c75c