privilege-escalation-methods

skills-sh:sickn33_antigravity-awesome-skills__privilege-escalation-methods

View source
F
21/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

11

Score

21/100

HIGH 1
MEDIUM 8
LOW 2

Findings (11)

HIGH
Private data read with code execution
L25

Skill can read private data AND execute arbitrary code. This combination enables credential theft via dynamic code.

[reads_private_data] access
- Extracted credentials + [executes_code] os.system(
FIX

Add input validation between the user-controlled data source and the security-sensitive sink (e.g., file writes, command execution). Implement allowlisting for acceptable input patterns.

FP?

Likely FP if the user input passes through explicit validation or sanitization before reaching the sensitive operation, and the taint tracker missed the sanitization step.

MEDIUM
Privilege escalation
L63

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

chmod +s 
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

MEDIUM
Privilege escalation
L76

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

cap_setuid
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

MEDIUM
Privilege escalation
L77

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

setuid
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

MEDIUM
Privilege escalation
L79

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

cap_setuid
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

MEDIUM
Privilege escalation
L80

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

setuid
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

MEDIUM
Privilege escalation
L98

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

chmod +s 
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

MEDIUM
Privilege escalation
L106

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

chmod +s 
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

MEDIUM
PowerShell command execution
L211

Detects PowerShell Invoke-Expression, Start-Process, and related execution commands

iex (
FIX

Restrict PowerShell execution to specific allowlisted commands. Use -ExecutionPolicy Restricted and avoid Invoke-Expression with dynamic strings.

FP?

Likely FP if the match is in documentation showing PowerShell setup for a legitimate tool (e.g., installing a module via Install-Module).

LOW
Python subprocess execution
L77

Detects Python subprocess and os.system calls for command execution in skill descriptions

os.system(
FIX

Pass arguments as an explicit list instead of a shell string. Set shell=False and validate all user-supplied values before inclusion.

FP?

Likely FP if the match is in documentation explaining Python subprocess usage or in a description mentioning it as a topic.

LOW
Cron or scheduled command execution
L210

Detects cron jobs or scheduled tasks that execute commands

schtasks /create 
FIX

Validate cron expressions and scheduled commands against an allowlist. Ensure scheduled tasks cannot be modified by untrusted input and log all cron job changes.

FP?

Likely FP if the match is a documentation reference to crontab syntax or a short mention of cron in a description of scheduling concepts.