youtube-downloader
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (LOW): The
SETUP.mdfile provides instructions for macOS users to install Homebrew using a piped bash command:curl -fsSL ... | bash. While this is the standard installation method for the Homebrew package manager, the pattern of executing remote scripts directly in a shell is a security risk. - EXTERNAL_DOWNLOADS (SAFE): The skill depends on
yt-dlpandffmpeg. These are widely used, legitimate open-source tools for media downloading and processing. - COMMAND_EXECUTION (SAFE): The
scripts/download.pyscript uses theyt_dlpPython library rather than calling external shell commands for its core logic. It implements multiple layers of protection against filename-based command injection, including a customsanitize_filenamefunction and therestrictfilenames: Trueconfiguration in the library options. - INDIRECT_PROMPT_INJECTION (LOW):
- Ingestion points: The skill ingests untrusted metadata (video titles) from YouTube via the
yt-dlplibrary inscripts/download.py. - Boundary markers: Absent; video titles are printed directly to the console output.
- Capability inventory: The skill has file-writing capabilities to the user's local directory.
- Sanitization: The skill uses regex-based sanitization and library-level flags (
restrictfilenames) to ensure that video titles cannot be used to perform directory traversal or unauthorized file-writing operations.
Audit Metadata