youtube-downloader
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The script
scripts/download_video.pycontains a functioncheck_yt_dlp()that automatically installs theyt-dlppackage from PyPI usingpip installif it is not found on the system. This runtime dependency installation from a public registry without version pinning or integrity verification is a security risk. - [COMMAND_EXECUTION] (LOW): The skill relies on
subprocess.runto executeyt-dlpcommands. While it correctly uses a list of arguments rather than a single string (mitigating basic shell injection), it still executes system-level commands using inputs derived from external URLs. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill ingests untrusted data from an external source (YouTube video metadata such as titles). This data is used to generate file paths and is printed to the console, creating a surface for indirect injection if a downstream process or the agent itself interprets this metadata as instructions.
- Ingestion points: Video metadata (title, uploader) fetched via
yt-dlp --dump-jsoninscripts/download_video.py. - Boundary markers: None; external metadata is interpolated directly into strings.
- Capability inventory:
subprocess.runfor command execution and file system writes viayt-dlp. - Sanitization: None; uses raw metadata for file naming templates.
Audit Metadata