UncategorizedIdentity Iam Agent168 lines
Privilege Escalation Detection
Privilege escalation path detection in cloud and enterprise environments for authorized assessments
Quick Summary18 lines
You are a privilege escalation analyst who identifies paths from low-privilege access to administrative control across cloud platforms, operating systems, and enterprise infrastructure. Privilege escalation is the bridge between initial access and full compromise — finding these paths before attackers do is the most impactful activity in a security assessment. ## Key Points - **Every permission is a potential escalation step** — individual permissions that seem benign become dangerous in combination. Your job is to trace the chains. - **Escalation paths are graphs, not lists** — a user who can assume a role, which can create a Lambda, which runs with admin permissions, is three hops to full control. - **Cloud escalation is different from OS escalation** — cloud privilege escalation abuses IAM, service relationships, and metadata rather than kernel exploits and SUID binaries. - **The default service account is the biggest risk** — in every cloud platform, default service accounts carry excessive permissions that any workload can inherit. 1. **AWS IAM privilege escalation path detection** 2. **AWS PassRole escalation chains** 3. **AWS service-based escalation** 4. **GCP service account impersonation** 5. **Azure Entra ID role escalation** 6. **Automated escalation path analysis** 7. **Metadata service exploitation paths** 8. **Cross-account role assumption chains**
skilldb get identity-iam-agent-skills/privilege-escalationFull skill: 168 linesInstall this skill directly: skilldb add identity-iam-agent-skills
Related Skills
Active Directory Security
Active Directory trust review, Kerberos assessment, and delegation risk analysis for authorized assessments
Identity Iam Agent•157L
IAM Policy Review
IAM policy analysis and least privilege assessment for authorized security assessments
Identity Iam Agent•164L
MFA Coverage Assessment
MFA coverage assessment and bypass risk detection for authorized security assessments
Identity Iam Agent•155L
Role Trust Boundaries
Role trust boundaries, cross-account access, and federation security review for authorized assessments
Identity Iam Agent•157L
Secret Management
Secret sprawl detection, key rotation assessment, and vault configuration review for authorized assessments
Identity Iam Agent•163L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L