github-dns-helper

Fail

Audited by Gen Agent Trust Hub on Mar 17, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [PRIVILEGE_ESCALATION]: The instructions in SKILL.md advise users to execute sudo chown $(whoami) /etc/hosts and chmod 644 /etc/hosts. This is a significant security risk that degrades system integrity by allowing any process running under the user's identity to modify critical system-wide DNS mappings.
  • [EXTERNAL_DOWNLOADS]: The script scripts/fix_github_dns.py downloads content from several unverified external sources and third-party proxies (e.g., hellogithub.com, ghp.ci, ghproxy.com). This content is written directly into the system's hosts file without cryptographic verification or sandboxing.
  • [COMMAND_EXECUTION]: The script uses subprocess.run with shell=True to execute various system commands like curl, ping, and DNS flushing utilities. It interpolates variables (such as URLs provided via command-line arguments) into shell strings, which is a dangerous pattern that can lead to command injection if the input is manipulated.
  • [DATA_EXFILTRATION]: While the script does not explicitly exfiltrate sensitive files, the ability to modify the system hosts file allows an attacker to redirect legitimate traffic (e.g., to GitHub or other sites) to malicious servers, which can be used for credential theft or phishing.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 17, 2026, 03:29 AM