Linux Privilege Escalation
Audited by Socket on Feb 17, 2026
1 alert found:
Malware[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] The fragment is coherently aligned with its stated purpose of systematic Linux privilege escalation guidance, but it is highly suspicious for open or public distribution without explicit authorization controls. It contains actionable exploit techniques, external payload fetches, and attacker-controlled data flows that could meaningfully enable unauthorized root access. In a supply-chain context, such a skill would be dangerous if published without stringent access controls, scope limitations, and red-teaming safeguards. It would be prudent to treat as SUSPICIOUS-MALICIOUS in public/OSS contexts unless distinctly labeled for authorized, tightly-scoped red-team usage and delivered with strong governance. LLM verification: This artifact is a high-risk offensive privilege escalation playbook. It contains explicit, actionable instructions to obtain and persist root access on Linux systems, including unsafe patterns (curl|sh, attacker-hosted binaries), credential theft techniques, and persistence/backdoor creation. For defensive or educational use the content should be reframed: remove or heavily restrict actionable exploit steps, eliminate instructions to host/execute attacker-hosted payloads, add integrity checks f