installing-taubyte-tooling
Fail
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The instructions utilize sudo to perform high-privilege operations such as updating system repositories (apt-get update), installing software (apt-get install), and configuring system services (systemctl enable/start).
- [COMMAND_EXECUTION]: The skill modifies system permissions by adding the current user to the docker group using sudo usermod -aG docker $USER, which is a sensitive privilege escalation step required for non-root Docker usage.
- [REMOTE_CODE_EXECUTION]: The skill uses a direct pipe from a network download to a shell (curl ... | sh) to install the tau and dream command-line tools from the domain get.tau.link. This pattern bypasses traditional package management and executes remote content with the user shell permissions.
- [EXTERNAL_DOWNLOADS]: The skill fetches resources from multiple external sites, including nodejs.org for Node.js installation advice, docs.docker.com for Docker setup, and get.tau.link for CLI script downloads.
Recommendations
- HIGH: Downloads and executes remote code from: https://get.tau.link/cli, https://get.tau.link/dream - DO NOT USE without thorough review
Audit Metadata