video-full-process
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
process_video.pyorchestrates a multi-step workflow by invoking external Python scripts (such astranscribe_video.pyandsuggest_chapters.py) and the system'sffmpegutility using thesubprocess.run()function. Arguments are passed as lists, which is a secure practice that prevents shell injection. File paths are managed through thepathliblibrary to ensure safe and platform-independent resolution.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted data (video content) through a transcription service, the output of which is subsequently used by an AI model to generate chapter suggestions.\n - Ingestion points: Video file content is transcribed into
transcript.jsonbyprocess_video.py.\n - Boundary markers: The skill does not implement explicit delimiters or instructions to the AI model to ignore or separate potential instructions embedded within the transcript data.\n
- Capability inventory: The skill has permissions to read and write files, and can execute shell commands via the
Bashtool andsubprocess.run()calls (specifically executing local scripts andffmpeg).\n - Sanitization: No sanitization, validation, or filtering of the transcribed text is performed before it is provided as input to the chapter suggestion logic.
Audit Metadata