unbound

Pass

Audited by Gen Agent Trust Hub on Mar 18, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [PRIVILEGE_ESCALATION]: The skill utilizes sudo for legitimate service management tasks such as reloading the configuration, checking syntax, and managing the unbound service via systemctl. These are standard administrative requirements for managing network services.
  • [UNVERIFIABLE_DEPENDENCIES_AND_REMOTE_CODE_EXECUTION]: A command is provided to fetch root hints from the official InterNIC server (https://www.internic.net/domain/named.cache). This is documented as a trusted source for DNS root information.
  • [DATA_EXPOSURE_AND_EXFILTRATION]: The configuration references local file paths for TLS keys and certificates in /etc/unbound/ for the remote-control feature. There are no patterns indicating these secrets are being leaked externally.
  • [INDIRECT_PROMPT_INJECTION]: The skill has a potential attack surface. 1. Ingestion points: unbound.conf and service logs from journalctl. 2. Boundary markers: Absent. 3. Capability inventory: sudo for service management and curl for data retrieval. 4. Sanitization: Absent.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 18, 2026, 01:37 PM