youtube-content
Pass
Audited by Gen Agent Trust Hub on Mar 22, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. It fetches external content (YouTube transcripts) and provides it to the agent for analysis without explicit instructions to ignore embedded commands or boundary markers to isolate the untrusted content.
- Ingestion points:
scripts/fetch_youtube.pyfetches the transcript and metadata from external YouTube URLs. - Boundary markers: Absent. The instructions in
SKILL.mdandreferences/analysis-modes.mddo not specify delimiters (like XML tags or triple backticks) or provide warnings to ignore instructions within the transcript. - Capability inventory: The skill can execute local scripts via
uv runand write files to the local file system (specifically~/.claude/knowledge/youtube/viascripts/save_analysis.py). - Sanitization: No sanitization or filtering of the transcript text is performed before processing.
- [EXTERNAL_DOWNLOADS]: The skill depends on external Python packages
youtube-transcript-apiandyt-dlpto fetch content from YouTube. While these are well-known and standard tools for this purpose, they involve network communication with external servers. - [COMMAND_EXECUTION]: The workflow relies on executing local Python scripts using the
uv runcommand. This is used for fetching data, saving results to the knowledge base, and searching existing records. While these scripts are part of the skill, the pattern of executing shell commands is a necessary part of its functionality.
Audit Metadata