Category

linux-privilege-escalation skills

Browse 1 skills in the linux-privilege-escalation category, with labels, findings, and runtime evidence where available.

1 matching skill
Page 1 of 1
category: linux-privilege-escalation
clear filters

Linux Privilege Escalation

GitHub:sickn33/antigravity-awesome-skills · linux-privilege-escalation
Needs Review

This skill assesses Linux systems for privilege escalation vulnerabilities. It identifies weaknesses that could allow a low-privilege user to gain root access.

Source: Workspace import

Originally ingested from a local workspace copy.

version da59a1730677
4 findings
OpenClaw disconnected clean
runtime tested
openclaw disconnected clean
no human review yet

Runtime evidence: OpenClaw disconnected runtime validation completed cleanly in the isolated runner.

Used fake placeholder env vars in the sandbox; no real credentials were exposed.

  • OpenClaw is available in the runner image as OpenClaw 2026.3.24 (cff6dc9).
  • The skill matched the basic OpenClaw-oriented layout checks used for disconnected validation.
  • SKILL.md does not explicitly mention OpenClaw; this may still be valid, but intent is less obvious.
  • No obvious script files found; disconnected runtime evidence may remain shallow.
  • No safe documented OpenClaw commands or package-script help probes were found; disconnected validation remains mostly structural.
Safety
51
Quality
94
Transparency
94
Operational
92

Automated result: Needs Review

Current public label: Needs Review

The current label should account for both the file-level review and the fact that the sandbox runtime pass did not come back perfectly clean.

Human review: none yet

The current public label is still relying on automation. A human has not weighed in yet.

Severity mix: 3 low, 1 info