yt-dlp
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/download.shimplements a wrapper that passes all provided arguments ($@) directly to theyt-dlpbinary. This enables argument injection vulnerabilities; an attacker providing a URL followed by flags like--exec <command>or--postprocessor-argscan achieve arbitrary command execution on the host system. - [EXTERNAL_DOWNLOADS]: The documentation files
references/guide.mdandreferences/usage.mdrecommend a 'curl-to-shell' installation method involvingsudo curlfrom a remote GitHub URL. While this is documentation and not automated code, it promotes insecure practices that bypass system package managers and signature verification. - [COMMAND_EXECUTION]: The skill's primary entry point does not sanitize the input URL or flags. If an agent is triggered by untrusted content (Indirect Prompt Injection), it could be tricked into executing
yt-dlpwith the--cookies-from-browserflag, potentially exposing sensitive session data from the host's web browsers to the external download process. - [COMMAND_EXECUTION]: The
scripts/setupscript creates a Python virtual environment and installsyt-dlpvia pip. While the use of a standard package registry is generally safe, the script lacks version pinning for the dependency, which could lead to unverifiable or breaking changes being introduced during the setup phase.
Audit Metadata