Linux Privilege Escalation
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Remote Code Execution (CRITICAL): The skill utilizes a piped shell command to execute remote code. Specifically, it runs
curl -L https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh | sh, which allows an external script to run with the permissions of the agent process without any validation or integrity checks. - Unverifiable Dependencies (CRITICAL): The download source
https://github.com/carlospolopis not part of the established Trusted GitHub Organizations. Executing code from third-party, non-whitelisted repositories represents a severe supply chain risk. - Privilege Escalation (HIGH): The targeted script,
linpeas.sh, is a specialized tool designed to search for privilege escalation vulnerabilities on Linux systems. In the context of an AI skill, this behavior is highly suspicious and indicative of malicious intent or a security-testing tool being misused.
Recommendations
- HIGH: Downloads and executes remote code from: https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata