Dns Lookup
v1.0.0Resolve hostnames to IP addresses using `dig` from bind-utils.
⭐ 1· 1.9k·5 current·5 all-time
by@xejrax
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description say 'Resolve hostnames to IP addresses using dig'. Declared binary requirement is 'dig' and the install step installs bind-utils which provides dig. Nothing requested is unrelated to DNS lookups.
Instruction Scope
SKILL.md contains explicit dig command examples (A, AAAA, ANY, reverse). It does not instruct reading other files, environment variables, or sending data to external endpoints beyond normal DNS queries.
Install Mechanism
Install spec uses the host package manager (dnf) to install bind-utils. This is a standard, low-risk method; no downloads from arbitrary URLs or archive extraction are present.
Credentials
No environment variables, credentials, or config paths are requested. The requested access is proportional to the stated function.
Persistence & Privilege
Skill is not marked always:true and does not request elevated persistent privileges. Agent-autonomous invocation is allowed (platform default) but there is nothing in the skill that suggests it abuses that capability.
Assessment
This skill is coherent and minimal: it simply runs dig to perform DNS queries. If you install it be aware: installing requires sudo dnf install (so it’s intended for Fedora/RHEL-style systems), and running the skill will perform outbound DNS requests (normal for lookups). It requests no credentials and has no hidden endpoints. If you need to restrict network/DNS activity for security/privacy, consider that the skill will perform DNS queries when invoked.Like a lobster shell, security has layers — review code before you run it.
latestvk97bqze17fbnf25qymh47yattd80fr1f
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🌐 Clawdis
Binsdig
