Adds core/host.{h,c} — a single struct skeletonkey_host populated once
at startup and handed to every module callback via ctx->host. Replaces
the per-detect uname / /etc/os-release / sysctl / userns-fork-probe
calls scattered across the corpus with O(1) cached lookups, and gives
the dispatcher one consistent view of the host.
What's in the fingerprint:
- Identity: kernel_version (parsed from uname.release), arch (machine),
nodename, distro_id / distro_version_id / distro_pretty (parsed once
from /etc/os-release).
- Process state: euid, real_uid (defeats userns illusion via
/proc/self/uid_map), egid, username, is_root, is_ssh_session.
- Platform family: is_linux, is_debian_family, is_rpm_family,
is_arch_family, is_suse_family (file-existence checks once).
- Capability gates (Linux): unprivileged_userns_allowed (live
fork+unshare probe), apparmor_restrict_userns,
unprivileged_bpf_disabled, kpti_enabled, kernel_lockdown_active,
selinux_enforcing, yama_ptrace_restricted.
- System services: has_systemd, has_dbus_system.
Wiring:
- core/module.h forward-declares struct skeletonkey_host and adds the
pointer to skeletonkey_ctx. Modules opt-in by including
../../core/host.h.
- core/host.c is fully POD (no heap pointers) — uses a single file-
static instance, returns a stable pointer on every call. Lazily
populated on first skeletonkey_host_get().
- skeletonkey.c calls skeletonkey_host_get() at main() entry, stores
in ctx.host before any register_*() runs.
- cmd_auto's bespoke distro-fingerprint code (was an inline
read_os_release helper) is replaced with skeletonkey_host_print_banner(),
which emits a two-line banner of identity + capability gates.
Migrations:
- dirtydecrypt: kernel_version_current() -> ctx->host->kernel.
- fragnesia: removed local fg_userns_allowed() fork-probe in favour of
ctx->host->unprivileged_userns_allowed (no per-scan fork). Also
pulls kernel from ctx->host. The PRECOND_FAIL message now notes
whether AppArmor restriction is on.
- pack2theroot: access('/etc/debian_version') -> ctx->host->is_debian_family;
also short-circuits when ctx->host->has_dbus_system is false (saves
the GLib g_bus_get_sync attempt on systems without system D-Bus).
- overlayfs: replaced the inline is_ubuntu() /etc/os-release parser
with ctx->host->distro_id comparison. Local helper preserved for
symmetry / standalone builds.
Documentation: docs/ARCHITECTURE.md gains a 'Host fingerprint'
section describing the struct, the opt-in include pattern, and
example detect() usage. ROADMAP --auto accuracy log notes the
landing and flags remaining modules as an incremental follow-up.
Build verification:
- macOS (local): make clean && make -> Mach-O x86_64, 31 modules,
banner prints with distro=?/? (no /etc/os-release).
- Linux (docker gcc:latest + libglib2.0-dev): make clean && make ->
ELF 64-bit, 31 modules. Banner prints with kernel + distro=debian/13
+ 7 capability gates. dirtydecrypt correctly says 'predates the
rxgk code added in 7.0'; fragnesia PRECOND_FAILs with
'(host fingerprint)' annotation; pack2theroot PRECOND_FAILs on
no-DBus; overlayfs reports 'not Ubuntu (distro=debian)'.
6.0 KiB
Architecture
Module model
Each CVE (or tightly-related family of CVEs sharing a primitive) is
a module under modules/. A module is a self-contained
exploit + detection + metadata bundle that exports a standard
interface to the top-level dispatcher.
Module layout
modules/<module_name>/
├── MODULE.md # Human-readable writeup of the bug
├── NOTICE.md # Credits to original researcher
├── kernel-range.json # Machine-readable affected kernels
├── module.c # Implements skeletonkey_module interface
├── module.h
├── detect/
│ ├── auditd.rules # blue team detection
│ ├── sigma.yml
│ └── yara.yara
├── src/ # exploit internals
└── tests/ # per-module tests (run in CI matrix)
skeletonkey_module interface (planned, Phase 1)
struct skeletonkey_module {
const char *name; /* "copy_fail" */
const char *cve; /* "CVE-2026-31431" */
const char *summary; /* one-line description */
/* Return 1 if host appears vulnerable, 0 if patched/immune,
* -1 if probe couldn't run. May call entrybleed_leak_kbase()
* etc. from core/ if a leak primitive is needed. */
int (*detect)(struct skeletonkey_host *host);
/* Run the exploit. Caller has already passed the
* authorization gate. Returns 0 on root acquired,
* nonzero on failure. */
int (*exploit)(struct skeletonkey_host *host, struct skeletonkey_opts *opts);
/* Apply a runtime mitigation for this CVE (sysctl, module
* blacklist, etc.). Returns 0 on success. NULL if no
* mitigation is offered. */
int (*mitigate)(struct skeletonkey_host *host);
/* Undo --exploit-backdoor or --mitigate side effects. */
int (*cleanup)(struct skeletonkey_host *host);
/* Affected kernel version range, distros covered, etc. */
const struct skeletonkey_kernel_range *ranges;
size_t n_ranges;
};
Modules register themselves at link time via a constructor-attribute
table. The top-level skeletonkey binary iterates the registry on each
invocation.
Shared core/
Code that more than one module needs lives in core/:
core/common.c— fingerprinting (kernel version, distro, LSM, hardening flags), logging, error handlingcore/apparmor_bypass.c— Ubuntu'sapparmor_restrict_unprivileged_userns=1defeat viachange_onexec("crun")re-execcore/exploit_su.c— once we have page-cache-write or /etc/passwd-overwrite, this is the shared "drop to root shell" helpercore/fcrypt.c— file-encryption helpers used by multiple modulescore/entrybleed.c(planned, Phase 3) — kbase leak primitive that any module needing KASLR-defeat can call
Top-level dispatcher
skeletonkey.c (planned, Phase 1) is the CLI entry point. Responsibilities:
- Parse args (
--scan,--exploit <name>,--mitigate,--detect-rules,--cleanup, etc.) - Fingerprint the host —
core/host.cis called once at startup to populatestruct skeletonkey_host(kernel version + arch + distro + capability gates + service presence). The result is handed to every module viactx->host. See "Host fingerprint" below. - For
--scan: iterate module registry, call each module'sdetect(), emit table of results - For
--exploit <name>: locate module, gate behind--i-know, call itsexploit() - For
--detect-rules: walk module registry, concatenate detection files in the requested format
Host fingerprint (core/host.{h,c})
A single struct skeletonkey_host is populated once at startup and
exposed to every module via ctx->host (a stable pointer for the
process lifetime). It carries:
- Identity:
struct kernel_version kernel+ arch + nodename + distro id/version/pretty (parsed from/etc/os-release). - Process state: euid, real_uid (defeats the userns illusion by
reading
/proc/self/uid_map), egid, username, is_root, is_ssh_session. - Platform family: is_linux, is_debian_family, is_rpm_family, is_arch_family, is_suse_family.
- Capability gates (Linux): unprivileged_userns_allowed (live fork-probe), apparmor_restrict_userns, unprivileged_bpf_disabled, kpti_enabled, kernel_lockdown_active, selinux_enforcing, yama_ptrace_restricted.
- System services: has_systemd, has_dbus_system.
Modules that want to consult the fingerprint do:
#include "../../core/host.h"
/* ... */
if (ctx->host && !ctx->host->unprivileged_userns_allowed)
return SKELETONKEY_PRECOND_FAIL;
if (ctx->host->kernel.major < 7)
return SKELETONKEY_OK; /* predates the bug */
The migration is opt-in per module — modules that don't #include
host.h continue to do their own probes; modules that do save the
duplicate work and get a consistent view across the whole scan.
--auto and --scan (in verbose mode) print a two-line banner of
the fingerprint via skeletonkey_host_print_banner() so operators
can see at a glance which gates are open.
CI matrix
.github/workflows/ci.yml (planned, Phase 4) runs each module's
test against a matrix of distro × kernel VMs. Each test asserts:
- on a vulnerable VM:
detect()returns 1,exploit()returns 0 and produces uid=0 - on a patched VM:
detect()returns 0,exploit()either refuses or fails gracefully
Failures on a previously-working matrix entry open an issue automatically (likely cause: distro shipped a backport that broke the module).
Adding a new CVE
git checkout -b add-cve-XXXX-NNNNcp -r modules/_stubs/_template modules/<module_name>- Fill in
MODULE.md,NOTICE.md,kernel-range.json - Implement
module.cexposing theskeletonkey_moduleinterface - Ship at least one detection rule under
detect/ - Add tests under
tests/ - PR. CI runs the matrix. If it lands root on at least one vulnerable matched VM AND fails cleanly on a patched VM, it merges.
See docs/module-template.md (planned) for the per-module checklist.