performing-aws-privilege-escalation-assessment
Audited by Socket on Mar 15, 2026
2 alerts found:
SecurityObfuscated FileSUSPICIOUS. The skill is internally coherent for an AWS privilege-escalation assessment, but it gives an AI agent offensive cloud-exploitation capability with real-world impact and forwards AWS credentials to multiple external tools. There is no clear exfiltration or credential-harvesting behavior, so this is not confirmed malware; the main concerns are offensive-agent enablement and moderate supply-chain trust from third-party tool installs.
This is a high-value offensive/defensive reference describing precise IAM/STS API calls and tools that enable privilege escalation and persistence in AWS accounts. While not malicious code by itself, it is highly actionable: with valid credentials it provides a clear roadmap for compromising AWS privileges. Use only in authorized testing with proper approvals and monitoring; defenders should use the document to hunt for the listed misuse patterns and harden IAM policies, enable logging/alerts, and enforce least privilege.