Technitium DNS
Analysis
This skill appears to be a read-only Technitium DNS health-check helper, but users should protect and tightly scope the API token it needs.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
base = os.environ.get('TECHNITIUM_URL', '').rstrip('/') ... Request(base + path + qs, headers={'Authorization': 'Bearer ' + token})The helper performs authenticated HTTP API requests to a user-configured base URL. This is expected for the skill's monitoring purpose, but users should verify the URL and token scope.
Source: unknown
The skill package source is not identified. The included files are small and there is no install spec or third-party dependency, but provenance is still a user-review point.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
export TECHNITIUM_TOKEN="..." ... Prefer a dedicated limited/read-only user and a non-expiring API token for monitoring.
The skill requires a Technitium API/session token, and the documentation recommends a non-expiring token. This is purpose-aligned, but it is still a persistent credential with permissions determined by the configured user.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
export TECHNITIUM_URL="http://dns-server.example:5380" ... Authorization: Bearer <token>
The skill communicates with an external Technitium HTTP API using a bearer token. The example URL uses HTTP, so token confidentiality depends on the user's network and transport configuration.
