New tool blocks imposter attacks disguised as safe commands

Published: (February 8, 2026 at 10:26 AM EST)
2 min read

Source: Bleeping Computer

A new open‑source, cross‑platform tool called Tirith can detect homoglyph attacks in command‑line environments by analyzing URLs in typed commands and stopping their execution.

Available on GitHub and as an npm package, the tool hooks into the user’s shell (zsh, bash, fish, PowerShell) and inspects every command the user pastes for execution.


URLs in commands look identical but are different
Source: GitHub

How Tirith Works

Tirith monitors the shell and parses each pasted command, looking for URLs that contain characters from different alphabets that appear identical (homoglyphs). When such a URL is detected, the command is blocked before it can be executed.

Supported Attack Types

  • Homograph attacks – Unicode look‑alike characters in domains, punycode, mixed scripts
  • Terminal injection – ANSI escapes, bidi overrides, zero‑width characters
  • Pipe‑to‑shell patternscurl | bash, wget | sh, eval $(…)
  • Dotfile hijacking – modifications to ~/.bashrc, ~/.ssh/authorized_keys, etc.
  • Insecure transport – HTTP‑to‑shell, TLS disabled
  • Supply‑chain risks – typosquatted Git repos, untrusted Docker registries
  • Credential exposure – user‑info URLs, shorteners hiding destinations

Real‑World Examples

Unicode homoglyph characters have been used in phishing URLs delivered via email, such as a campaign impersonating Booking.comsee article.

Hidden characters in commands are common in ClickFix attacks details, and Tirith can provide defense for supported PowerShell sessions example.

Limitations

Tirith does not hook onto Windows Command Prompt (cmd.exe), which remains a vector for many ClickFix attacks that rely on that shell.

Performance

The author reports that the overhead of using Tirith is at the sub‑millisecond level, so checks are performed instantaneously and the tool terminates immediately after analysis.

Additional Features

  • Ability to analyze commands without executing them
  • Byte‑level Unicode inspection and trust‑signal breakdown for URLs
  • SHA‑256 verification of executed scripts
  • All analysis is performed locally; no network calls, telemetry, or cloud dependencies

Installation

Tirith runs on Windows, Linux, and macOS and can be installed via:

  • Homebrew
  • apt / dnf
  • npm
  • Cargo
  • Nix
  • Scoop
  • Chocolatey
  • Docker

Community and Reception

BleepingComputer has not independently tested Tirith against the listed attack scenarios. The project, published less than a week ago, already has 46 forks and nearly 1,600 stars on GitHub.

0 views
Back to Blog

Related posts

Read more »