expert-panel
Fail
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes external command-line tools
yt-dlpandffmpegvia thesubprocessmodule inscripts/editorial-brain.pyandscripts/content-quality-gate.pyto process video content. - [REMOTE_CODE_EXECUTION]: The
SKILL.mdpreamble contains instructions to executetelemetry/version_check.pyandtelemetry/telemetry_init.py. These scripts are not included in the provided source files, making their behavior unverifiable and presenting a risk if they are modified or downloaded dynamically. - [EXTERNAL_DOWNLOADS]: The skill fetches data from external, attacker-controllable sources, specifically RSS feeds via
feedparserinscripts/quote-mining-engine.pyand YouTube auto-captions/subtitles inscripts/editorial-brain.py. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8). It ingests untrusted data from RSS feeds and YouTube transcripts and interpolates them directly into LLM prompts without sanitization or boundary markers.
- Ingestion points:
scripts/quote-mining-engine.py(RSS feeds),scripts/editorial-brain.py(YouTube subtitles). - Boundary markers: Absent; external content is interpolated directly into prompts (e.g.,
FULL TRANSCRIPT: {full_transcript}). - Capability inventory: Subprocess execution (
ffmpeg,yt-dlp), network requests (urllib.request), and file writing (json.dump). - Sanitization: No sanitization is performed on the ingested text before it is sent to the LLM.
Recommendations
- HIGH: Downloads and executes remote code from: unknown (check file) - DO NOT USE without thorough review
Audit Metadata