video-analyzer
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The Python script
scripts/analyze_video.pycontains a command injection vulnerability in thehandle_transcriptfunction. Thelangparameter is accepted from input and interpolated directly into shell command strings executed viasubprocess.run(shell=True)without sanitization or quoting. A crafted language string can be used to execute arbitrary shell commands on the host system. - [EXTERNAL_DOWNLOADS]: The skill fetches pre-trained machine learning models from Hugging Face's official repository at runtime to enable local transcription.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted transcripts from external video platforms.
- Ingestion points: Video transcripts extracted by
yt-dlporwhisper-cliinscripts/analyze_video.py. - Boundary markers: Absent; no delimiters are used when the transcript is presented to the agent.
- Capability inventory: The agent can execute shell commands via the
analyze_video.pyscript and perform network operations viayt-dlpandwhisper-cli. - Sanitization: No sanitization is performed on the transcript content before analysis.
Recommendations
- AI detected serious security threats
Audit Metadata