Nslookup Tool

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using the tool can create DNS queries for the domain or hostname provided.

Why it was flagged

The script resolves whatever hostname is supplied as the first command-line argument. This is expected for a DNS lookup tool, but users should recognize that supplied hostnames may be sent to the configured DNS resolver.

Skill content
print(socket.gethostbyname(sys.argv[1]))
Recommendation

Use it only for hostnames or IPs you are comfortable resolving through your configured DNS path, especially for sensitive internal names.

What this means

Users have less information to verify the publisher or original source of the skill.

Why it was flagged

The skill has limited provenance information. There are no declared external installs or dependencies, so this is a provenance notice rather than evidence of a risky dependency chain.

Skill content
Source: unknown
Homepage: none
Recommendation

If provenance matters in your environment, verify the registry owner and review the included files before installing.

What this means

Users may expect richer nslookup behavior than the included code supports.

Why it was flagged

The documentation advertises record-type and custom-DNS-server features, while the included script only performs a simple first-argument hostname resolution. This could mislead users about diagnostic coverage, but it does not show deceptive safety or privacy claims.

Skill content
Query specific DNS record types (A, AAAA, MX, CNAME, TXT)
- Specify custom DNS server
Recommendation

Treat the skill as a basic forward DNS resolver unless the missing record-type and custom-server functionality is added and documented accurately.