meitu-video-dance
Fail
Audited by Gen Agent Trust Hub on May 5, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill constructs and executes shell commands for the
meituCLI by directly interpolating user-provided inputs (image_url,video_url) and a dynamically constructedcomposed_prompt. The absence of explicit sanitization or shell-escaping logic for these variables creates a significant vulnerability where a malicious user could execute arbitrary system commands. - [CREDENTIALS_UNSAFE]: The skill is designed to read sensitive API keys (
MEITU_OPENAPI_ACCESS_KEYandMEITU_OPENAPI_SECRET_KEY) from environment variables and the local file path~/.meitu/credentials.json. While this is part of the vendor's standard authentication flow, it constitutes access to sensitive credentials. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface (Category 8) by processing untrusted data from user-provided URLs to generate prompts that control the behavior of the
meitutool. - Ingestion points: Untrusted data enters the context via the
image_urlandvideo_urlparameters inSKILL.md. - Boundary markers: None identified; the skill processes external input and interpolates the results directly into downstream prompts and command arguments.
- Capability inventory: The skill has the capability to execute shell commands (
meitu), create directories (mkdir), and perform file system read/write operations. - Sanitization: There is no mention of input validation, URL filtering, or shell-safe interpolation in the workflow description.
Recommendations
- AI detected serious security threats
Audit Metadata