kernel-exploitation
Warn
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: Provides instructions for system-level hijacking to achieve privilege escalation.\n
- Evidence: The skill describes overwriting the
modprobe_pathkernel variable inSKILL.mdto redirect system-level execution to a user-controlled script (/tmp/x) with root privileges.\n- [COMMAND_EXECUTION]: Includes commands for modifying sensitive file permissions.\n - Evidence: Payload examples in
SKILL.mdusechmod 777to expose protected system files such as/flag.\n- [EXTERNAL_DOWNLOADS]: Fetches software source code from a well-known official distribution site.\n - Evidence:
SKILL.mdcontains awgetcommand targeting the official Linux kernel archives atcdn.kernel.orgfor environment setup and debugging.
Audit Metadata