Python3.10
An interesting system capability has been identified; /usr/bin/python3.10 cap_setuid=ep
This was enumerated by PEAS at a later stage as well
According to GTFObins, python with the CAP_SETUID capability can be abused for Privilege Escalation
It also has the ep capability assigned to it
Checking an online resource revealed that the ep capability means that binary will run as root
Another resource revealed that ep stands for effective and permitted according to the official documentation
This effectively makes the binary SUID