Linux Privilege Escalation

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • Remote Code Execution (HIGH): The skill uses a highly dangerous pattern (curl | sh) to execute a remote script (linpeas.sh) directly from an external URL. This allows for arbitrary code execution on the host system without any verification of the script's contents.
  • Privilege Escalation (HIGH): The script being executed is specifically designed for local privilege escalation discovery. Executing such tools via automated skills indicates high-risk intent or the potential for system compromise.
  • External Downloads (MEDIUM): The source URL (github.com/carlospolop) is not part of the [TRUST-SCOPE-RULE] defined list of trusted organizations or repositories. Downloading and executing code from untrusted external sources violates secure development practices.
Recommendations
  • HIGH: Downloads and executes remote code from: https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:04 PM