This skill contains patterns for remote execution or sensitive file access. Review the source carefully before installing.
Execute systematic privilege escalation assessments on Linux systems to identify and exploit misconfigurations, vulnerable services, and security weaknesses that allow elevation from low-privilege user access to root-level control.
This skill is applicable to execute the workflow or actions described in the overview.
AI-powered evaluation of trust, security posture, quality signals, and fit for your use case. Grounded in the skill's actual data.
Detected signals: hidden HTML comments, remote execution pattern, network calls in instructions, missing license.
• Downloads and executes remote code at runtime. Review the SKILL.md carefully — this pattern is a high-severity signal unless the skill explicitly documents the source and integrity checks.
• Makes external network requests. Check SKILL.md for which endpoints are contacted and why.
• Contains HTML comments in the skill definition. This is sometimes used to embed hidden instructions. Review the raw SKILL.md if you want to audit the full content.
• No license declared. Usage rights are ambiguous — contact the skill author before using commercially.
Compare this skill side-by-side with an alternative to find the best fit.
Compare with another skill →