linux-privilege-escalation

Fail

Audited by Socket on Apr 9, 2026

3 alerts found:

SecurityMalwarex2
SecurityMEDIUM
SKILL.md

SUSPICIOUS. The skill is internally consistent as an offensive privesc playbook, but that purpose itself gives an AI agent high-risk exploit capability. The main extra trust issue is the remote LinPEAS curl|sh installer; otherwise the dominant concern is deliberate offensive execution, credential harvesting, persistence, and transitive loading of related attack skills rather than clear standalone malware/exfil code.

Confidence: 93%Severity: 92%
MalwareHIGH
KERNEL_EXPLOITS_CHECKLIST.md

This fragment is a high-risk exploitation/persistence runbook. It provides end-to-end instructions to fingerprint targets, select matching kernel/container privilege-escalation exploits, download/compile PoCs, execute them for root or container escape, and establish persistence via SSH/cron (including unsafe ‘download-and-execute’ patterns). It is not compatible with a benign software-supply dependency use case and should be treated as extremely dangerous.

Confidence: 90%Severity: 100%
MalwareHIGH
SUID_CAPABILITIES_TRICKS.md

This fragment is a highly weaponized SUID/capabilities exploitation and post-exploitation guide containing direct root-shell payloads, credential theft/modification instructions targeting /etc/shadow and /etc/passwd, persistence via cron deployment, and exfiltration/payload staging to attacker-controlled endpoints. If present in any distributed dependency, it represents extreme malicious intent and unacceptable risk.

Confidence: 90%Severity: 100%
Audit Metadata
Analyzed At
Apr 9, 2026, 01:15 PM
Package URL
pkg:socket/skills-sh/yaklang%2Fhack-skills%2Flinux-privilege-escalation%2F@8ce1365acafa481041f63305a0c747a3c646e777