performing-privilege-escalation-on-linux

Fail

Audited by Snyk on Apr 7, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content contains explicit, actionable instructions and tooling to discover and exploit privilege-escalation vectors (SUID/sudo abuse, kernel exploits like Dirty Pipe/PwnKit, cron/PATH hijacking, Docker escape, creating SUID binaries for persistence), which directly facilitates deliberate system compromise and persistence despite an "authorized use" notice.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).


MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs enumeration and exploitation techniques (SUID/SGID, sudo misconfigurations, kernel exploits, writable systemd/cron files, etc.) with the stated goal of achieving root, which directly guides compromising and modifying the host system.

Issues (4)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 7, 2026, 01:00 PM
Issues
4