Linux Privilege Escalation

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • Remote Code Execution (CRITICAL): The automated scan detected a piped execution pattern: curl -L [URL] | sh. This method executes unverified remote scripts directly on the host system, allowing for arbitrary command execution.
  • External Downloads (HIGH): The script is sourced from the carlospolop/PEASS-ng repository, which is not on the list of trusted GitHub repositories or organizations. Per the [TRUST-SCOPE-RULE], this is an untrusted remote dependency.
Recommendations
  • CRITICAL: Downloads and executes remote code from untrusted source(s): https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh - DO NOT USE
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 17, 2026, 08:01 AM