taubyte-local-host-launch
Pass
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill leverages various CLI tools including
dream,tau,docker, andcurlto interact with the local development environment. It instructs the agent to automatically invoketaubyte-hosts-file-editor, a tool that modifies system-level network configuration files, often requiring elevated privileges. This automation is intended to streamline local DNS resolution for the developer. - [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection due to the lack of input sanitization when constructing shell commands.
- Ingestion points: The variables
<domain-name>,<fqdn>,<port>, and<path>are ingested from external sources and interpolated into bash commands (SKILL.md). - Boundary markers: No delimiters or defensive instructions are used to separate untrusted data from the command structure.
- Capability inventory: The skill possesses the capability to execute shell commands and modify system configuration files via
dream,tau, and the referenced hosts editor (SKILL.md). - Sanitization: No sanitization or validation of user-provided variables is performed before execution.
- Remediation: All external inputs used in shell commands should be validated against a strict allowlist (e.g., regex for valid domain names and ports) and properly escaped to prevent arbitrary command execution.
Audit Metadata