@grumpybozo @clacke an oft overlooked vector is sysadmin machines with dangling SSH agents set to an identity allowing an open door to root on a remote machine. Laptops are stolen left AFK powered on, a fuzzable lock screen between the attacker and root on remote hosts, and often just a few up arrows back in history. This is another reason why it is wise to have a depriv jailed UNIX account (no bypasses) as a landing or lobby account, and with a tight sudo timeout. A 2nd line of defense.