performing-privilege-escalation-assessment
Audited by Socket on Mar 16, 2026
2 alerts found:
AnomalySecurityThis is a non-executable reference document describing privilege-escalation enumeration commands, MITRE techniques, and helpful libraries/resources. It is not itself malicious code and contains no programmatic sources or sinks. However, the content is actionable and dual-use: it could be used for legitimate security assessments or abused by attackers. Treat it as a guidance artifact rather than executable code; if incorporated into a runtime dependency that executes commands, that runtime code should be audited carefully.
SUSPICIOUS/HIGH-RISK skill. Its capabilities are internally consistent with its stated purpose, but that purpose is to equip an AI agent with offensive privilege-escalation and post-exploitation procedures, including credential discovery, exploit execution, cloud metadata access, and payload deployment. This is not confirmed malware, but it is a dangerous security/exploit skill with substantial potential for misuse and should be treated as high risk.