baoyu-youtube-transcript
Warn
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script executes the
yt-dlpcommand with the--remote-components ejs:githuband--js-runtimes bunflags inscripts/youtube.ts. This allows the tool to fetch and execute external parsing logic from GitHub and run JavaScript from video pages using the local Bun runtime.\n- [COMMAND_EXECUTION]: TheSKILL.mdfile contains instructions directing the AI agent to autonomously ensureyt-dlpis available (e.g., by installing it) if it is missing from the environment. This bypasses standard user oversight for software installation and system modifications.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it ingests untrusted YouTube transcript data and passes it to an LLM via theprompts/speaker-transcript.mdtemplate for speaker identification and formatting.\n - Ingestion points: Raw transcript data fetched from YouTube InnerTube API or
yt-dlpinscripts/main.ts.\n - Boundary markers: The prompt uses a simple
# Transcriptheader but lacks strong instructions to ignore embedded commands within the content.\n - Capability inventory: The skill can perform file system writes (
writeFileSync) and execute shell commands (spawnSync) inscripts/main.tsandscripts/youtube.ts.\n - Sanitization: There is no evidence of filtering or sanitizing the transcript text before it is provided to the LLM.
Audit Metadata