media-processing
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The shell scripts
scripts/remove-background.shandscripts/batch-remove-background.shcontain logic to automatically install thermbg-clipackage globally usingnpm install -g rmbg-cliif the command is not found on the system. - [COMMAND_EXECUTION]: Multiple Python scripts (
batch_resize.py,media_convert.py,video_optimize.py) and shell scripts execute system commands for media processing. While the Python scripts use the recommended list-based approach forsubprocess.run()to mitigate command injection, the automated nature of these tools on user-provided files is a core capability that requires user trust in the input data. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8). An attacker could provide maliciously crafted media files designed to exploit vulnerabilities in FFmpeg or ImageMagick (such as the 'ImageTragick' class of vulnerabilities).
- Ingestion points: Media files provided as arguments to processing scripts in
scripts/. - Boundary markers: The skill does not implement specific boundary markers or 'ignore' instructions for the content of the processed media metadata.
- Capability inventory: The skill has extensive capabilities to execute shell commands and write to the file system across all processing scripts.
- Sanitization: Scripts rely on standard shell quoting and
subprocesslist-style arguments, which protect against simple filename-based injection but not against vulnerabilities within the media processing libraries themselves.
Audit Metadata