Your Mosh session just triggered a privilege escalation warning.
That’s the moment you understand the stakes. Remote shells are fast, light, and, if left unchecked, a direct door to your system’s core. Mosh, loved for its speed over flaky connections, isn’t immune. Privilege escalation alerts exist for a reason: they’re the last wall before unsafe commands rewrite the rules of your machine.
Attackers thrive on the smallest gap in awareness. A missed escalation attempt inside an active Mosh session can mean a pivot from a harmless user account to root control. The logs may be short. The traces can vanish fast. By the time you notice, escalation paths could already be exploited.
A proper privilege escalation alert system watches every active shell, monitors for suspicious escalations like sudo, su, doas, or custom privilege binaries, and links them instantly to the session source. With Mosh, traditional SSH monitoring misses things. You need tooling that speaks Mosh’s language, catching shifts in privilege in real time without losing visibility between connection drops or IP changes.