Using PDDL to find privilege escalation paths | Dark Hacker News