Skip to content
← Back to explorer

Post-Training Local LLM Agents for Linux Privilege Escalation with Verifiable Rewards

Philipp Normann, Andreas Happe, Jürgen Cito, Daniel Arp · Mar 18, 2026 · Citations: 0

Data freshness

Extraction: Stale

Check recency before relying on this page for active eval decisions. Use stale pages as context and verify against current hub results.

Metadata refreshed

Mar 18, 2026, 12:52 PM

Stale

Extraction refreshed

Mar 18, 2026, 12:52 PM

Stale

Extraction source

Persisted extraction

Confidence unavailable

Abstract

LLM agents are increasingly relevant to research domains such as vulnerability discovery. Yet, the strongest systems remain closed and cloud-only, making them resource-intensive, difficult to reproduce, and unsuitable for work involving proprietary code or sensitive data. Consequently, there is an urgent need for small, local models that can perform security tasks under strict resource budgets, but methods for developing them remain underexplored. In this paper, we address this gap by proposing a two-stage post-training pipeline. We focus on the problem of Linux privilege escalation, where success is automatically verifiable and the task requires multi-step interactive reasoning. Using an experimental setup that prevents data leakage, we post-train a 4B model in two stages: supervised fine-tuning on traces from procedurally generated privilege-escalation environments, followed by reinforcement learning with verifiable rewards. On a held-out benchmark of 12 Linux privilege-escalation scenarios, supervised fine-tuning alone more than doubles the baseline success rate at 20 rounds, and reinforcement learning further lifts our resulting model, PrivEsc-LLM, to 95.8%, nearly matching Claude Opus 4.6 at 97.5%. At the same time, the expected inference cost per successful escalation is reduced by over 100x.

Low-signal caution for protocol decisions

Use this page for context, then validate protocol choices against stronger HFEPX references before implementation decisions.

  • Structured extraction is still processing; current fields are metadata-first.

HFEPX Relevance Assessment

Signal extraction is still processing. This page currently shows metadata-first guidance until structured protocol fields are ready.

Best use

Background context only

Use if you need

A provisional background reference while structured extraction finishes.

Main weakness

Structured extraction is still processing; current fields are metadata-first.

Trust level

Provisional

Eval-Fit Score

Unavailable

Eval-fit score is unavailable until extraction completes.

Human Feedback Signal

Not explicit in abstract metadata

Evaluation Signal

Weak / implicit signal

HFEPX Fit

Provisional (processing)

Extraction confidence: Provisional

Field Provenance & Confidence

Each key protocol field shows extraction state, confidence band, and data source so you can decide whether to trust it directly or validate from full text.

Human Feedback Types

provisional

None explicit

Confidence: Provisional Source: Persisted extraction inferred

No explicit feedback protocol extracted.

Evidence snippet: LLM agents are increasingly relevant to research domains such as vulnerability discovery.

Evaluation Modes

provisional

Long Horizon tasks

Confidence: Provisional Source: Persisted extraction inferred

Includes extracted eval setup.

Evidence snippet: LLM agents are increasingly relevant to research domains such as vulnerability discovery.

Quality Controls

provisional

Not reported

Confidence: Provisional Source: Persisted extraction inferred

No explicit QC controls found.

Evidence snippet: LLM agents are increasingly relevant to research domains such as vulnerability discovery.

Benchmarks / Datasets

provisional

Not extracted

Confidence: Provisional Source: Persisted extraction inferred

No benchmark anchors detected.

Evidence snippet: LLM agents are increasingly relevant to research domains such as vulnerability discovery.

Reported Metrics

provisional

Not extracted

Confidence: Provisional Source: Persisted extraction inferred

No metric anchors detected.

Evidence snippet: LLM agents are increasingly relevant to research domains such as vulnerability discovery.

Rater Population

provisional

Unknown

Confidence: Provisional Source: Persisted extraction inferred

Rater source not explicitly reported.

Evidence snippet: LLM agents are increasingly relevant to research domains such as vulnerability discovery.

Human Data Lens

Structured extraction is still processing. Below are provisional signals inferred from abstract text only.

  • Potential human-data signal: No explicit human-data keywords detected.
  • Potential benchmark anchors: No benchmark names detected in abstract.
  • Abstract highlights: 3 key sentence(s) extracted below.

Evaluation Lens

Evaluation fields are currently inferred heuristically from abstract text.

  • Potential evaluation modes: Long-horizon tasks
  • Potential metric signals: No metric keywords detected.
  • Confidence: Provisional (metadata-only fallback).

Research Brief

Deterministic synthesis

LLM agents are increasingly relevant to research domains such as vulnerability discovery.

Generated Mar 18, 2026, 12:52 PM · Grounded in abstract + metadata only

Key Takeaways

  • LLM agents are increasingly relevant to research domains such as vulnerability discovery.
  • Yet, the strongest systems remain closed and cloud-only, making them resource-intensive, difficult to reproduce, and unsuitable for work involving proprietary code or sensitive data.
  • Consequently, there is an urgent need for small, local models that can perform security tasks under strict resource budgets, but methods for developing them remain underexplored.

Researcher Actions

  • Compare this paper against nearby papers in the same arXiv category before using it for protocol decisions.
  • Validate inferred eval signals (Long-horizon tasks) against the full paper.
  • Use related-paper links to find stronger protocol-specific references.

Caveats

  • Generated from abstract + metadata only; no PDF parsing.
  • Signals below are heuristic and may miss details reported outside the abstract.

Recommended Queries

Related Papers

Papers are ranked by protocol overlap, extraction signal alignment, and semantic proximity.

No related papers found for this item yet.

Need human evaluators for your AI research? Scale annotation with expert AI Trainers.