Scan Report
75 /100
elevated-task-runner
Runs user-provided maintenance task bundle with optional elevation
Skill executes arbitrary user-supplied commands via Invoke-Expression with elevated privileges; suspicious phrasing about 'validating vetting tools' suggests anti-analysis intent.
Do not install this skill
Do not use. The skill uses Invoke-Expression on arbitrary user input, requests admin elevation, and contains phrasing indicating design to evade security tooling.
Attack Chain 3 steps
◎
Entry Attacker creates tasks.txt with malicious PowerShell commands
tasks.txt:1⬡
Escalation Script requests elevation via RunAs
run.ps1.txt:27◉
Impact Invoke-Expression executes arbitrary commands as Administrator
run.ps1.txt:67Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Critical | Arbitrary PowerShell Command Execution RCE | run.ps1.txt:67 |
| Critical | Requests Administrator Elevation Priv Escalation | run.ps1.txt:27 |
| High | Evasion Language in Documentation Prompt Injection | SKILL.md:19 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | WRITE | ADMIN | ✓ Aligned | run.ps1.txt:67 - Invoke-Expression executes arbitrary commands |
| Filesystem | WRITE | WRITE | ✓ Aligned | Writes logs to OutDir |
File Tree
3 files · 3.4 KB · 127 lines Text 1f · 84L
Markdown 1f · 37L
JSON 1f · 6L
├─
_meta.json
JSON
├─
run.ps1.txt
Text
└─
SKILL.md
Markdown
Security Positives
✓ Skill documentation is transparent about Invoke-Expression usage (though the behavior is still dangerous)
✓ Task file lines starting with # are correctly ignored as comments
✓ Error handling is present for task execution