Linux Privilege Escalation
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Remote Code Execution (HIGH): The skill uses a highly dangerous pattern (
curl | sh) to execute a remote script (linpeas.sh) directly from an external URL. This allows for arbitrary code execution on the host system without any verification of the script's contents. - Privilege Escalation (HIGH): The script being executed is specifically designed for local privilege escalation discovery. Executing such tools via automated skills indicates high-risk intent or the potential for system compromise.
- External Downloads (MEDIUM): The source URL (github.com/carlospolop) is not part of the [TRUST-SCOPE-RULE] defined list of trusted organizations or repositories. Downloading and executing code from untrusted external sources violates secure development practices.
Recommendations
- HIGH: Downloads and executes remote code from: https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata