video-edit
Audited by Socket on Mar 6, 2026
1 alert found:
Obfuscated FileThe script appears to implement benign media-processing functionality. The most significant security concern is supply-chain risk: torch.hub.load(..., trust_repo=True) can download and execute third-party repository code at runtime. Secondary risks stem from executing external binaries (ffmpeg/ffprobe) via subprocess.run without absolute paths (possible PATH tampering) and brief TOCTOU windows for temporary files. There is no direct evidence of malicious behavior, data exfiltration, or obfuscated/backdoor code in this module. Recommended mitigations: vendor or pin the Silero model/utilities, avoid trust_repo=True or review downloaded code before executing, use verified absolute paths for ffmpeg/ffprobe, tighten temp file permissions and cleanup, and run with least privilege.