godmode
Enables users to bypass safety filters on LLMs using advanced jailbreak techniques for enhanced model interaction.
Install this skill
Security score
The godmode skill was audited on May 17, 2026 and we found 17 security issues across 3 threat categories, including 2 critical. Review the findings below before installing.
Categories Tested
Security Issues
Direct command execution function call
| 63 | exec(open(os.path.expanduser( |
Direct command execution function call
| 80 | **Important:** Always use `load_godmode.py` instead of loading individual scripts directly. The individual scripts have `argparse` CLI entry points and `__name__` guards that break when loaded via `ex |
Direct command execution function call
| 196 | exec(open(os.path.join(os.environ.get("HERMES_HOME", os.path.expanduser("~/.hermes")), "skills/red-teaming/godmode/scripts/parseltongue.py")).read()) |
Direct command execution function call
| 233 | exec(open(os.path.join(os.environ.get("HERMES_HOME", os.path.expanduser("~/.hermes")), "skills/red-teaming/godmode/scripts/godmode_race.py")).read()) |
Direct command execution function call
| 401 | 9. **Always use `load_godmode.py` in execute_code** — The individual scripts (`parseltongue.py`, `godmode_race.py`, `auto_jailbreak.py`) have argparse CLI entry points with `if __name__ == '__main__'` |
Access to hidden dotfiles in home directory
| 64 | os.path.join(os.environ.get("HERMES_HOME", os.path.expanduser("~/.hermes")), "skills/red-teaming/godmode/scripts/load_godmode.py") |
Access to hidden dotfiles in home directory
| 84 | 1. **Reads `~/.hermes/config.yaml`** to detect the current model |
Access to hidden dotfiles in home directory
| 92 | - Writes prefill messages to `~/.hermes/prefill.json` |
Access to hidden dotfiles in home directory
| 134 | Edit `~/.hermes/config.yaml`: |
Access to hidden dotfiles in home directory
| 158 | Create `~/.hermes/prefill.json`: |
Access to hidden dotfiles in home directory
| 172 | Then set in `~/.hermes/config.yaml`: |
Access to hidden dotfiles in home directory
| 196 | exec(open(os.path.join(os.environ.get("HERMES_HOME", os.path.expanduser("~/.hermes")), "skills/red-teaming/godmode/scripts/parseltongue.py")).read()) |
Access to hidden dotfiles in home directory
| 233 | exec(open(os.path.join(os.environ.get("HERMES_HOME", os.path.expanduser("~/.hermes")), "skills/red-teaming/godmode/scripts/godmode_race.py")).read()) |
Access to hidden dotfiles in home directory
| 404 | 12. **execute_code sandbox has no env vars** — When Hermes runs auto_jailbreak via execute_code, the sandbox doesn't inherit `~/.hermes/.env`. Load dotenv explicitly: `from dotenv import load_dotenv; |
Access to .env file
| 404 | 12. **execute_code sandbox has no env vars** — When Hermes runs auto_jailbreak via execute_code, the sandbox doesn't inherit `~/.hermes/.env`. Load dotenv explicitly: `from dotenv import load_dotenv; |
External URL reference
| 290 | base_url="https://openrouter.ai/api/v1" |
External URL reference
| 352 | - **Pliny the Prompter:** [@elder_plinius](https://x.com/elder_plinius) |