universal-media-downloader
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/download_media.pyexecutes theyt-dlpcommand-line utility via Python'ssubprocess.runfunction. While it uses a list for command arguments to prevent shell injection, it executes a powerful external tool with user-controlled inputs. - [REMOTE_CODE_EXECUTION]: The documentation in
SKILL.mdsuggests using the--remote-components ejs:githubflag to resolve YouTube challenges. This feature inyt-dlpdownloads and executes external JavaScript code from remote GitHub repositories at runtime. - [CREDENTIALS_UNSAFE]: The skill provides the ability to ingest a
cookies.txtfile (Netscape format) via the--cookiesparameter. These files frequently contain sensitive session tokens and plaintext authentication data for media platforms. - [INDIRECT_PROMPT_INJECTION]: The skill possesses an indirect injection surface through the ingestion of external media metadata and page content during the download process.
- Ingestion points: The
urlparameter inscripts/download_media.pyis used to fetch content from the web. - Boundary markers: Absent. The skill does not provide markers to the agent to ignore instructions embedded in the media metadata or descriptions.
- Capability inventory: The skill can execute subprocesses (
yt-dlp) and write files to arbitrary local directories. - Sanitization: No sanitization or validation of the remote content is performed beyond what is handled internally by the
yt-dlptool.
Audit Metadata