remotion
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The file
SKILL.md(Step 1) instructs the agent to perform agit clonefrom an untrusted GitHub repository (https://github.com/Ceeon/remotion-skill.git) if the skill directory is missing. This repository is not within the defined [TRUST-SCOPE-RULE] organizations. - PROMPT_INJECTION (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8) because it uses untrusted user input to generate or adapt React code which is then executed via the Remotion CLI.
- Ingestion points: User descriptions and ASCII sketches enter the context as natural language prompts (see
SKILL.md, Step 2). - Boundary markers: Absent. There are no instructions to use delimiters or specific safety warnings to ignore embedded instructions within user-provided content.
- Capability inventory: The agent has the capability to write new
.tsxfiles to the filesystem (SKILL.md, Step 4) and execute shell commands (npx remotion render) in Step 6. - Sanitization: Absent. The skill provides no mechanism to sanitize or validate the code logic generated from user input before execution.
- COMMAND_EXECUTION (MEDIUM): The skill frequently executes shell commands, including
npm install(viaSKILL.mdand脚本库/check-env.sh) andnpx remotion render. While these are part of the intended functionality, they provide a powerful execution environment for potentially malicious code introduced via untrusted repositories or user-injected logic.
Recommendations
- AI detected serious security threats
Audit Metadata