youtube-search

Pass

Audited by Gen Agent Trust Hub on Mar 27, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill utilizes shell commands to run yt-dlp for scraping and jq for data processing, which is necessary for the tool's core functionality.
  • [EXTERNAL_DOWNLOADS]: The skill fetches metadata from YouTube's public endpoints. YouTube is a well-known and established service.
  • [PROMPT_INJECTION]: User-supplied search queries are interpolated directly into shell command strings (e.g., yt-dlp "ytsearch10:${QUERY}"). This represents an indirect prompt injection surface as it could be exploited for command injection if the execution environment does not properly escape shell metacharacters. Ingestion points: User query and result count parameters in SKILL.md. Boundary markers: None. Capability inventory: Shell command execution via yt-dlp and jq. Sanitization: No explicit escaping or input validation instructions are provided.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 27, 2026, 06:09 AM