Linux Privilege Escalation
This skill simulates Linux privilege escalation attacks to understand vulnerabilities and improve security defenses.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add davila7-linux-privilege-escalation npx -- -y @trustedskills/davila7-linux-privilege-escalation
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"davila7-linux-privilege-escalation": {
"command": "npx",
"args": [
"-y",
"@trustedskills/davila7-linux-privilege-escalation"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
Linux Privilege Escalation
What it does
This skill enables AI agents to analyze Linux systems for misconfigurations and vulnerabilities that allow unauthorized access from a low-privilege user to root. It automates the detection of common escalation vectors such as SUID binaries, kernel exploits, and cron job abuses to map out potential attack paths.
When to use it
- Conducting penetration tests on Linux servers to identify weaknesses before malicious actors exploit them.
- Auditing CI/CD pipelines or container environments where service accounts may have excessive permissions.
- Investigating security incidents where an attacker has gained initial foothold but lacks root access.
- Validating the effectiveness of hardening measures implemented by DevOps teams.
Key capabilities
- Scans for SUID and SGID binaries with dangerous capabilities.
- Identifies writable configuration files owned by root in user-writable directories.
- Detects misconfigured cron jobs, systemd services, and sudo rules.
- Analyzes kernel versions against known CVE databases for local exploits.
- Checks for weak file permissions on shadow passwords and SSH keys.
Example prompts
- "Scan this Linux environment for privilege escalation vectors starting from a standard user context."
- "Identify any SUID binaries or cron jobs that could allow an attacker to gain root access."
- "Analyze the system configuration and suggest specific misconfigurations that enable local privilege escalation."
Tips & gotchas
Ensure you have write access to the target environment or are running this in a controlled, isolated lab, as scanning may require elevated permissions to fully assess certain vectors. Always verify findings manually, as automated scans can produce false positives regarding system state or permission nuances.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.