taubyte-hosts-file-editor

Warn

Audited by Gen Agent Trust Hub on Apr 24, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill instructs the agent to modify the system hosts file, which is a sensitive system path (/etc/hosts on Unix-like systems and C:\Windows\System32\drivers\etc\hosts on Windows).
  • [COMMAND_EXECUTION]: Explicitly requests administrative or elevated privileges to perform file write operations on system-protected paths.
  • [PROMPT_INJECTION]: The skill uses external inputs (FQDNs and IP addresses) to update system-wide network routing configuration, creating a surface for indirect prompt injection.
  • Ingestion points: User-supplied FQDNs and Target IP inputs
  • Boundary markers: Not present in instructions
  • Capability inventory: Writing to critical system configuration files
  • Sanitization: Basic format validation is performed (no scheme or port), but there is no mechanism to verify the legitimacy or safety of the mapping being created.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 24, 2026, 05:41 PM