Linux Privilege Escalation
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Remote Code Execution (CRITICAL): The automated scan detected a piped execution pattern:
curl -L [URL] | sh. This method executes unverified remote scripts directly on the host system, allowing for arbitrary command execution. - External Downloads (HIGH): The script is sourced from the
carlospolop/PEASS-ngrepository, which is not on the list of trusted GitHub repositories or organizations. Per the [TRUST-SCOPE-RULE], this is an untrusted remote dependency.
Recommendations
- CRITICAL: Downloads and executes remote code from untrusted source(s): https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh - DO NOT USE
- AI detected serious security threats
Audit Metadata