performing-privilege-escalation-on-linux

Fail

Audited by Socket on Apr 7, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

SUSPICIOUS. The skill’s capabilities align with its stated red-team purpose, but that purpose is itself a high-risk offensive security function for an AI agent. It meaningfully increases compromise capability, may require downloading lightly-verified third-party tooling, and enables root-level actions on real systems.

Confidence: 90%Severity: 88%
MalwareHIGH
references/workflows.md

This file is a clear privilege-escalation playbook containing actionable steps to enumerate and escalate privileges on Linux systems, including remote downloads and execution of tools, SUID/sudo abuse, kernel exploit usage, creation of SUID binaries, LD_PRELOAD abuse, cron PATH hijacking, Docker/NFS escapes. It is dual-use but poses a high security risk if used maliciously. Treat as dangerous guidance and do not execute these instructions on systems without explicit authorization.

Confidence: 90%Severity: 85%
Audit Metadata
Analyzed At
Apr 7, 2026, 01:02 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fperforming-privilege-escalation-on-linux%2F@c80e43d1d26b1129ffe69f4bedc3d33c2204a112