video-processing-editing
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: In the script
video_editor.py, theeval()function is used to calculate thefpsvalue from ther_frame_ratemetadata field returned byffprobe. Usingeval()on data that originates from external files is an unsafe practice that can lead to arbitrary code execution if the input metadata is maliciously crafted. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface as it processes untrusted video files without adequate sanitization of the extracted metadata.
- Ingestion points: The
get_video_infofunction invideo_editor.pyextracts metadata from video files viaffprobe. - Boundary markers: No validation or boundary markers are used to isolate the metadata from the execution environment.
- Capability inventory: The skill can execute various system commands and scripts via
subprocess.run, providing an execution path for code injected viaeval(). - Sanitization: The use of
eval()represents a complete lack of sanitization for the frame rate metadata field, where safer alternatives like a dedicated fraction parser should have been used.
Audit Metadata