performing-privilege-escalation-on-linux
Audited by Socket on Apr 7, 2026
2 alerts found:
SecurityMalwareSUSPICIOUS. The skill’s capabilities align with its stated red-team purpose, but that purpose is itself a high-risk offensive security function for an AI agent. It meaningfully increases compromise capability, may require downloading lightly-verified third-party tooling, and enables root-level actions on real systems.
This file is a clear privilege-escalation playbook containing actionable steps to enumerate and escalate privileges on Linux systems, including remote downloads and execution of tools, SUID/sudo abuse, kernel exploit usage, creation of SUID binaries, LD_PRELOAD abuse, cron PATH hijacking, Docker/NFS escapes. It is dual-use but poses a high security risk if used maliciously. Treat as dangerous guidance and do not execute these instructions on systems without explicit authorization.