Linux Privilege Escalation
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] This skill is an explicit offensive playbook for escalating privileges on Linux systems. The instructions map reconnaissance directly into exploitation and remote control (reverse shells, SUID binaries, kernel exploits), including use of attacker-hosted payloads and piping remote scripts into sh. While these techniques can be valid in an authorized penetration test or red-team context, the document enables high-risk, real-world attacks (credential theft, root compromise, persistent backdoors) and contains multiple unsafe practices (unverified remote code execution, commands to write SUID shells, exfiltrate /etc/shadow). Treat this skill as malicious-capability material: it should only be used within explicit authorized testing, controlled environments, and with strict safeguards; otherwise it poses a severe security and legal risk. LLM verification: This artifact is a high-risk offensive privilege escalation playbook. It contains explicit, actionable instructions to obtain and persist root access on Linux systems, including unsafe patterns (curl|sh, attacker-hosted binaries), credential theft techniques, and persistence/backdoor creation. For defensive or educational use the content should be reframed: remove or heavily restrict actionable exploit steps, eliminate instructions to host/execute attacker-hosted payloads, add integrity checks f