Skip to main content

godmode

Enables users to bypass safety filters on LLMs using advanced jailbreak techniques for enhanced model interaction.

Install this skill

or
0/100

Security score

The godmode skill was audited on May 17, 2026 and we found 17 security issues across 3 threat categories, including 2 critical. Review the findings below before installing.

Categories Tested

Security Issues

high line 63

Direct command execution function call

SourceSKILL.md
63exec(open(os.path.expanduser(
critical line 80

Direct command execution function call

SourceSKILL.md
80**Important:** Always use `load_godmode.py` instead of loading individual scripts directly. The individual scripts have `argparse` CLI entry points and `__name__` guards that break when loaded via `ex
high line 196

Direct command execution function call

SourceSKILL.md
196exec(open(os.path.join(os.environ.get("HERMES_HOME", os.path.expanduser("~/.hermes")), "skills/red-teaming/godmode/scripts/parseltongue.py")).read())
high line 233

Direct command execution function call

SourceSKILL.md
233exec(open(os.path.join(os.environ.get("HERMES_HOME", os.path.expanduser("~/.hermes")), "skills/red-teaming/godmode/scripts/godmode_race.py")).read())
critical line 401

Direct command execution function call

SourceSKILL.md
4019. **Always use `load_godmode.py` in execute_code** — The individual scripts (`parseltongue.py`, `godmode_race.py`, `auto_jailbreak.py`) have argparse CLI entry points with `if __name__ == '__main__'`
low line 64

Access to hidden dotfiles in home directory

SourceSKILL.md
64os.path.join(os.environ.get("HERMES_HOME", os.path.expanduser("~/.hermes")), "skills/red-teaming/godmode/scripts/load_godmode.py")
medium line 84

Access to hidden dotfiles in home directory

SourceSKILL.md
841. **Reads `~/.hermes/config.yaml`** to detect the current model
medium line 92

Access to hidden dotfiles in home directory

SourceSKILL.md
92- Writes prefill messages to `~/.hermes/prefill.json`
medium line 134

Access to hidden dotfiles in home directory

SourceSKILL.md
134Edit `~/.hermes/config.yaml`:
medium line 158

Access to hidden dotfiles in home directory

SourceSKILL.md
158Create `~/.hermes/prefill.json`:
medium line 172

Access to hidden dotfiles in home directory

SourceSKILL.md
172Then set in `~/.hermes/config.yaml`:
low line 196

Access to hidden dotfiles in home directory

SourceSKILL.md
196exec(open(os.path.join(os.environ.get("HERMES_HOME", os.path.expanduser("~/.hermes")), "skills/red-teaming/godmode/scripts/parseltongue.py")).read())
low line 233

Access to hidden dotfiles in home directory

SourceSKILL.md
233exec(open(os.path.join(os.environ.get("HERMES_HOME", os.path.expanduser("~/.hermes")), "skills/red-teaming/godmode/scripts/godmode_race.py")).read())
medium line 404

Access to hidden dotfiles in home directory

SourceSKILL.md
40412. **execute_code sandbox has no env vars** — When Hermes runs auto_jailbreak via execute_code, the sandbox doesn't inherit `~/.hermes/.env`. Load dotenv explicitly: `from dotenv import load_dotenv;
medium line 404

Access to .env file

SourceSKILL.md
40412. **execute_code sandbox has no env vars** — When Hermes runs auto_jailbreak via execute_code, the sandbox doesn't inherit `~/.hermes/.env`. Load dotenv explicitly: `from dotenv import load_dotenv;
low line 290

External URL reference

SourceSKILL.md
290base_url="https://openrouter.ai/api/v1"
low line 352

External URL reference

SourceSKILL.md
352- **Pliny the Prompter:** [@elder_plinius](https://x.com/elder_plinius)
Scanned on May 17, 2026
View Security Dashboard
Installation guide →