Dns Lookup

PassAudited by ClawScan on May 1, 2026.

Overview

This is a narrow DNS lookup skill using the standard `dig` tool; the main user-visible considerations are normal DNS queries and an optional system package install.

This skill appears safe and narrowly scoped for DNS lookups. Before installing, confirm you trust your OS package repositories if you need to install `bind-utils`, and avoid querying sensitive internal hostnames unless you are comfortable with those names being visible to your DNS resolver.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Hostnames or IPs you ask it to look up may be exposed through normal DNS resolution paths.

Why it was flagged

The skill instructs use of the local `dig` command to perform DNS lookups. This is central to the stated purpose, but DNS queries may be visible to the user's configured resolver or network.

Skill content
dig example.com A +short
Recommendation

Use it for domains or IP addresses you are comfortable querying, and review commands before using unusual record types such as `ANY`.

What this means

Installing the dependency can modify local system packages and requires trust in the configured OS package source.

Why it was flagged

The skill provides a setup command that installs an operating-system package with elevated privileges. This is purpose-aligned because `bind-utils` provides `dig`, but it depends on the user's configured package repositories.

Skill content
sudo dnf install bind-utils
Recommendation

Install `bind-utils` only from trusted repositories and only if `dig` is not already available.