cloudflare-dns
Fail
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill attempts to download a binary from
https://github.com/wsvn53/flarectl/releases/download/flarectl-v0.1.0-alpine-arm64/flarectl-linux-arm64. Whileflarectlis a legitimate tool maintained by Cloudflare, this source is an untrusted individual user account, which is a major supply chain risk. - [REMOTE_CODE_EXECUTION]: After downloading the binary from an untrusted source, the skill makes it executable via
chmod +xand runs it with system-level permissions. This allows the third-party binary to execute arbitrary code on the host system. - [COMMAND_EXECUTION]: The skill uses Python scripts to wrap the untrusted binary and execute bulk DNS operations using
subprocess.run. This execution chain relies entirely on the integrity of the downloaded file which cannot be verified.
Recommendations
- AI detected serious security threats
Audit Metadata