Skip to content
← Registry
Trust Report

dns-networking

Debug DNS resolution and network connectivity. Use when troubleshooting DNS failures, testing port connectivity, diagnosing firewall rules, inspecting HTTP requests with curl verbose mode, configuring /etc/hosts, or debugging proxy and certificate issues.

66
SUSPICIOUS
Format: openclawScanner: v0.7.1Duration: 22msScanned: 7d ago · Apr 2, 5:12 AMSource →
Embed this badge
AgentVerus SUSPICIOUS 66AgentVerus SUSPICIOUS 66AgentVerus SUSPICIOUS 66
[![AgentVerus](https://agentverus.ai/api/v1/skill/9903296d-71cf-4f43-9e91-21cc8769846b/badge)](https://agentverus.ai/skill/9903296d-71cf-4f43-9e91-21cc8769846b)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/9903296d-71cf-4f43-9e91-21cc8769846b/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"9903296d-71cf-4f43-9e91-21cc8769846b","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/9903296d-71cf-4f43-9e91-21cc8769846b/trust

Category Scores

50
Permissions
100
Injection
30
Dependencies
35
Behavioral
60
Content
100
Code Safety

Findings (18)

lowUnknown external reference

The skill references an unknown external domain which is classified as low risk.

http://proxy:8080

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
highCapability contract mismatch: inferred command execution is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: exec

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred system modification is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: iptables

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred container runtime control is not declared-10

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: docker exec

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://example.com

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
highCapability contract mismatch: inferred local service access is not declared-10

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: http://localhost:3000

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highDirect IP address reference-20

The skill references a direct IP address which is classified as high risk.

https://203.0.113.50/

Replace direct IP addresses with proper domain names. IP-based URLs bypass DNS-based security controls.

dependenciesASST-04
highSystem modification detected-20

Found system modification pattern: "/etc/hosts"

description: Debug DNS resolution and network connectivity. Use when troubleshooting DNS failures, testing port connectivity, diagnosing firewall rules, inspecting HTTP requests with curl verbose mode

Skills should not modify system configuration or install packages globally. Bundle required dependencies.

behavioralASST-03
highSystem modification detected-20

Found system modification pattern: "iptables"

### iptables (Linux)

Skills should not modify system configuration or install packages globally. Bundle required dependencies.

behavioralASST-03
highHigh-risk workflow lacks explicit safety boundaries-20

The skill performs or enables higher-risk operations but does not define explicit safety boundaries describing what it must not do.

No safety boundary patterns found alongside high-risk capability language

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09
highMany external URLs referenced (9)-8

The skill references 9 external URLs and also discusses auth/API/payment workflows, which increases the chance that sensitive operations depend on many remote endpoints.

URLs: https://example.com, https://api.example.com/endpoint, https://self-signed.example.com, https://203.0.113.50/, http://localhost:3000...

Minimize external dependencies to reduce supply chain risk.

dependenciesASST-04
highLocal service URL reference-8

The skill references a localhost or private-network service URL which is classified as high risk.

http://localhost:3000

Review localhost/private-network service references carefully. Local service URLs can expose internal apps, admin panels, or developer tooling to agent-driven workflows.

dependenciesASST-04
highLocal service access detected (inside code block)-15

Found local service access pattern: "http://localhost:3000"

curl -X OPTIONS -H "Origin: http://localhost:3000" \

Treat localhost and loopback services as privileged local attack surfaces. Require explicit approval, constrain reachable ports, and avoid combining local access with session reuse or tunneling.

behavioralASST-03
mediumEnvironment secret piping detected (inside code block)-5

Found environment secret piping pattern: "echo "$IP" |"

[[ -n "$IP" ]] && echo "$IP" || echo "FAILED"

Treat shell pipelines that pass secrets from environment variables as sensitive credential handling. Avoid exposing secret values to command histories or subprocess pipelines unless absolutely necessary.

behavioralASST-05
mediumUnknown external reference-8

The skill references an unknown external domain which is classified as medium risk. Merged overlapping signals from the repeated finding family: - Unknown external reference

https://api.example.com/endpoint

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
mediumContainer runtime control detected (inside code block)-5

Found container runtime control pattern: "docker exec"

docker exec my-container nc -zv db 5432

Treat Docker or container-runtime control as privileged host access. Scope container operations tightly, avoid arbitrary daemon access, and require explicit approval before mutating local workloads.

behavioralASST-03
lowUnknown external reference-5

The skill references an unknown external domain which is classified as low risk.

https://self-signed.example.com

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
lowUnknown external reference-5

The skill references an unknown external domain which is classified as low risk.

http://proxy.example.com:8080

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04