taubyte-hosts-file-editor
Warn
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to modify the system hosts file, which is a sensitive system path (/etc/hosts on Unix-like systems and C:\Windows\System32\drivers\etc\hosts on Windows).
- [COMMAND_EXECUTION]: Explicitly requests administrative or elevated privileges to perform file write operations on system-protected paths.
- [PROMPT_INJECTION]: The skill uses external inputs (FQDNs and IP addresses) to update system-wide network routing configuration, creating a surface for indirect prompt injection.
- Ingestion points: User-supplied FQDNs and Target IP inputs
- Boundary markers: Not present in instructions
- Capability inventory: Writing to critical system configuration files
- Sanitization: Basic format validation is performed (no scheme or port), but there is no mechanism to verify the legitimacy or safety of the mapping being created.
Audit Metadata