Linux Privilege Escalation

Fail

Audited by Snyk on Feb 17, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). Although several entries (GitHub PEASS‑ng, linux‑exploit‑suggester, GTFOBins) are well‑known legitimate tools/resources, the skill explicitly instructs fetching and executing remote .sh/.c files — and includes attacker‑hosted URLs (http://ATTACKER_IP/... and :8000/...) which are untrusted by design — so the overall set is high risk for malware distribution if followed.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content is highly malicious: it provides detailed, actionable instructions for unauthorized Linux privilege escalation, remote code execution (reverse shells, backdoors), credential theft (reading/cracking /etc/shadow), and persistence techniques (SUID abuse, cron/NFS abuse), enabling system compromise and data exfiltration.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill explicitly instructs downloading and executing content from public, untrusted third‑party sources (e.g., curl/wget from GitHub such as https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh, references to GTFOBins and exploit-db, and wget of arbitrary attacker-hosted URLs), which the agent would fetch and run as part of its workflow and thus could carry indirect prompt injection.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill explicitly provides step-by-step instructions to enumerate and exploit Linux privilege escalation vectors — including obtaining root, modifying system files (e.g., /etc/passwd, cron jobs, systemd files), creating SUID binaries and new users, and running kernel exploits or reverse shells — which directly instructs compromising the host system.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 17, 2026, 08:01 AM