Resolve hostnames to IP addresses using `dig` from bind-utils.
Security Analysis
high confidenceThe skill's requirements and instructions align with its stated purpose (running dig from bind-utils to perform DNS lookups); there are no extra credentials, odd install sources, or out-of-scope instructions.
Name/description say 'Resolve hostnames to IP addresses using dig'. Declared binary requirement is 'dig' and the install step installs bind-utils which provides dig. Nothing requested is unrelated to DNS lookups.
SKILL.md contains explicit dig command examples (A, AAAA, ANY, reverse). It does not instruct reading other files, environment variables, or sending data to external endpoints beyond normal DNS queries.
Install spec uses the host package manager (dnf) to install bind-utils. This is a standard, low-risk method; no downloads from arbitrary URLs or archive extraction are present.
No environment variables, credentials, or config paths are requested. The requested access is proportional to the stated function.
Skill is not marked always:true and does not request elevated persistent privileges. Agent-autonomous invocation is allowed (platform default) but there is nothing in the skill that suggests it abuses that capability.
Guidance
This skill is coherent and minimal: it simply runs dig to perform DNS queries. If you install it be aware: installing requires sudo dnf install (so it’s intended for Fedora/RHEL-style systems), and running the skill will perform outbound DNS requests (normal for lookups). It requests no credentials and has no hidden endpoints. If you need to restrict network/DNS activity for security/privacy, consider that the skill will perform DNS queries when invoked.
Latest Release
v1.0.0
Initial publish
More by @Xejrax
Published by @Xejrax on ClawHub