youtube-search
Pass
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes shell commands to run
yt-dlpfor scraping andjqfor data processing, which is necessary for the tool's core functionality. - [EXTERNAL_DOWNLOADS]: The skill fetches metadata from YouTube's public endpoints. YouTube is a well-known and established service.
- [PROMPT_INJECTION]: User-supplied search queries are interpolated directly into shell command strings (e.g.,
yt-dlp "ytsearch10:${QUERY}"). This represents an indirect prompt injection surface as it could be exploited for command injection if the execution environment does not properly escape shell metacharacters. Ingestion points: User query and result count parameters in SKILL.md. Boundary markers: None. Capability inventory: Shell command execution via yt-dlp and jq. Sanitization: No explicit escaping or input validation instructions are provided.
Audit Metadata