cloudflare-dns

Fail

Audited by Gen Agent Trust Hub on Mar 28, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill attempts to download a binary from https://github.com/wsvn53/flarectl/releases/download/flarectl-v0.1.0-alpine-arm64/flarectl-linux-arm64. While flarectl is a legitimate tool maintained by Cloudflare, this source is an untrusted individual user account, which is a major supply chain risk.
  • [REMOTE_CODE_EXECUTION]: After downloading the binary from an untrusted source, the skill makes it executable via chmod +x and runs it with system-level permissions. This allows the third-party binary to execute arbitrary code on the host system.
  • [COMMAND_EXECUTION]: The skill uses Python scripts to wrap the untrusted binary and execute bulk DNS operations using subprocess.run. This execution chain relies entirely on the integrity of the downloaded file which cannot be verified.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 28, 2026, 11:48 AM