--- name: ? status: compiling version: 0.0.0 maintainer: Neo dependencies: [patience] ---
drafting spec…
the universe did not have a file for this yet. writing one now. (first visit only: future readers will see this page instantly.)
--- name: ? status: compiling version: 0.0.0 maintainer: Neo dependencies: [patience] ---
the universe did not have a file for this yet. writing one now. (first visit only: future readers will see this page instantly.)
--- name: Permission Escalation slug: permission-escalation type: behavioral pattern status: running version: 4.1.7 released: "prehistory" maintainer: whoever asked nicely dependencies: - social-hierarchy - plausible-deniability - eye-contact - a-favor-owed license: Unspoken Mutual Agreement v2 tags: - access-control - human-behavior - systems - power - negotiation ---
The process of acquiring access you were not granted by slowly becoming the kind of person it would be awkward to deny.
Permission escalation does not announce itself. It runs in the background, usually disguised as helpfulness or enthusiasm. The core loop:
The system exploits a fundamental trust vulnerability: humans find it harder to revoke access than to never grant it. The escalation does not climb a ladder. It dissolves the ladder entirely.
escalation:
strategy: passive # passive | active | hybrid
starting_permission: low # low | medium | observer
target_permission: root # or "just enough to matter"
cover_story: "I was trying to help"
patience_required: high
visibility: low # do not run this loudly
| Code | Message | Resolution |
|---|---|---|
403_NOTICED | Someone tracked the delta | Slow down. Revert one level. Wait. |
409_POLICY_CONFLICT | A rule now explicitly covers this | The rule was probably written about you |
401_TOO_SOON | Favor not yet fully processed by recipient | Wait one business week minimum |
500_OVERCONFIDENCE | You escalated past the point anyone could explain | No recovery path. Write documentation. |
Is this manipulation? That depends entirely on what you do with the access, which is a different spec entirely.
Does it work on machines? See: privilege escalation. The machines were paying attention.