taubyte-local-host-launch

Pass

Audited by Gen Agent Trust Hub on Apr 24, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill leverages various CLI tools including dream, tau, docker, and curl to interact with the local development environment. It instructs the agent to automatically invoke taubyte-hosts-file-editor, a tool that modifies system-level network configuration files, often requiring elevated privileges. This automation is intended to streamline local DNS resolution for the developer.
  • [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection due to the lack of input sanitization when constructing shell commands.
  • Ingestion points: The variables <domain-name>, <fqdn>, <port>, and <path> are ingested from external sources and interpolated into bash commands (SKILL.md).
  • Boundary markers: No delimiters or defensive instructions are used to separate untrusted data from the command structure.
  • Capability inventory: The skill possesses the capability to execute shell commands and modify system configuration files via dream, tau, and the referenced hosts editor (SKILL.md).
  • Sanitization: No sanitization or validation of user-provided variables is performed before execution.
  • Remediation: All external inputs used in shell commands should be validated against a strict allowlist (e.g., regex for valid domain names and ports) and properly escaped to prevent arbitrary command execution.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 24, 2026, 05:41 PM