kernel-exploitation

Warn

Audited by Gen Agent Trust Hub on Apr 9, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: Provides instructions for system-level hijacking to achieve privilege escalation.\n
  • Evidence: The skill describes overwriting the modprobe_path kernel variable in SKILL.md to redirect system-level execution to a user-controlled script (/tmp/x) with root privileges.\n- [COMMAND_EXECUTION]: Includes commands for modifying sensitive file permissions.\n
  • Evidence: Payload examples in SKILL.md use chmod 777 to expose protected system files such as /flag.\n- [EXTERNAL_DOWNLOADS]: Fetches software source code from a well-known official distribution site.\n
  • Evidence: SKILL.md contains a wget command targeting the official Linux kernel archives at cdn.kernel.org for environment setup and debugging.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 9, 2026, 01:13 PM