skills/mukul975/anthropic-cybersecurity-skills/performing-privilege-escalation-assessment/Gen Agent Trust Hub
performing-privilege-escalation-assessment
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyperforms automated system enumeration by executing shell commands via thesubprocessmodule to identify potential escalation vectors. - Evidence: The
_runmethod utilizessubprocess.runto execute various system commands such asuname -a,sudo -l,getcap, andfind(for SUID binaries). - Intent: The execution is limited to gathering system state information necessary for the skill's primary function of privilege escalation auditing.
- [EXTERNAL_DOWNLOADS]: The skill documentation and metadata reference several external security tools and repositories used as industry standards for auditing.
- Evidence:
SKILL.mdandreferences/api-reference.mdsuggest the use oflinpeas.sh(from carlospolop/PEASS-ng),winPEAS.exe,GTFOBins, andLOLBAS. - Context: These references target well-known open-source security projects and are documented as prerequisites for the assessment workflow.
- [SAFE]: The skill exhibits an indirect prompt injection surface through the ingestion of system configuration data, but lacks automated execution chains that would exploit it.
- Ingestion points: The
check_writable_cronfunction inscripts/agent.pyreads the content of files within/etc/cron.d/and other cron directories. - Boundary markers: No explicit delimiters or boundary markers are used in the data ingestion or report generation process.
- Capability inventory: The script has the capability to execute shell commands via
subprocess.runand write results to the local filesystem. - Sanitization: The script uses
shlex.splitto safely parse commands when shell redirection or piping characters are not detected.
Audit Metadata