Nslookup Tool
AdvisoryAudited by Static analysis on Apr 30, 2026.
Overview
No suspicious patterns detected.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Using the tool can create DNS queries for the domain or hostname provided.
The script resolves whatever hostname is supplied as the first command-line argument. This is expected for a DNS lookup tool, but users should recognize that supplied hostnames may be sent to the configured DNS resolver.
print(socket.gethostbyname(sys.argv[1]))
Use it only for hostnames or IPs you are comfortable resolving through your configured DNS path, especially for sensitive internal names.
Users have less information to verify the publisher or original source of the skill.
The skill has limited provenance information. There are no declared external installs or dependencies, so this is a provenance notice rather than evidence of a risky dependency chain.
Source: unknown Homepage: none
If provenance matters in your environment, verify the registry owner and review the included files before installing.
Users may expect richer nslookup behavior than the included code supports.
The documentation advertises record-type and custom-DNS-server features, while the included script only performs a simple first-argument hostname resolution. This could mislead users about diagnostic coverage, but it does not show deceptive safety or privacy claims.
Query specific DNS record types (A, AAAA, MX, CNAME, TXT) - Specify custom DNS server
Treat the skill as a basic forward DNS resolver unless the missing record-type and custom-server functionality is added and documented accurately.
