.@amlw wrote a great proof of concept for #XZ to allow code execution via ssh.
Very important note: it doesn’t work in the wild as you need the private key, which only the threat actor(s) have. But you can create your own for exploiting your own servers.