shorts
Pass
Audited by Gen Agent Trust Hub on Apr 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of system commands and subprocesses to perform video processing tasks.
- Evidence: Multiple scripts (
transcribe.py,detect_content.py,compute_reframe.py,snap_boundaries.py,export.sh,preflight.sh) executeffmpegandffprobeto manipulate media files, detect video properties, and extract audio. - Evidence:
scripts/detect_gpu.shexecutesnvidia-smito detect local hardware capabilities. - Evidence:
remotion/render.mjsexecutes headless Chrome via the Remotion renderer to generate video frames. - [EXTERNAL_DOWNLOADS]: The skill requires several third-party dependencies to be installed during setup.
- Evidence:
setup.shusespipto install packages includingfaster-whisper,mediapipe,numpy,opencv-python, andtorch(from official PyPI and PyTorch registries). - Evidence:
setup.shrunsnpm installwithin theremotion/directory to fetch Node.js packages likeremotion,react, andzodfrom the npm registry. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through the content of processed videos.
- Ingestion points: In Step 4 of
SKILL.md, the agent is instructed to readtranscript.json, which contains the text of the video provided by the user. - Boundary markers: There are no explicit instructions or delimiters used when Claude reads the transcript to prevent it from following commands embedded in the spoken text.
- Capability inventory: The agent has access to
Bash,Write, andTasktools, which could be abused if an attacker-controlled video successfully influences the agent's behavior during transcript analysis. - Sanitization: The skill performs text 'cleanup' (Step 4) to remove filler words, but this is intended for caption aesthetics rather than security sanitization.
Audit Metadata