github-dns-helper
Fail
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PRIVILEGE_ESCALATION]: The instructions in
SKILL.mdadvise users to executesudo chown $(whoami) /etc/hostsandchmod 644 /etc/hosts. This is a significant security risk that degrades system integrity by allowing any process running under the user's identity to modify critical system-wide DNS mappings. - [EXTERNAL_DOWNLOADS]: The script
scripts/fix_github_dns.pydownloads content from several unverified external sources and third-party proxies (e.g.,hellogithub.com,ghp.ci,ghproxy.com). This content is written directly into the system'shostsfile without cryptographic verification or sandboxing. - [COMMAND_EXECUTION]: The script uses
subprocess.runwithshell=Trueto execute various system commands likecurl,ping, and DNS flushing utilities. It interpolates variables (such as URLs provided via command-line arguments) into shell strings, which is a dangerous pattern that can lead to command injection if the input is manipulated. - [DATA_EXFILTRATION]: While the script does not explicitly exfiltrate sensitive files, the ability to modify the system
hostsfile allows an attacker to redirect legitimate traffic (e.g., to GitHub or other sites) to malicious servers, which can be used for credential theft or phishing.
Recommendations
- AI detected serious security threats
Audit Metadata