youtube-downloader
Warn
Audited by Gen Agent Trust Hub on Apr 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/download_video.pyperforms extensive shell command execution viasubprocess.runto manageyt-dlp,ffmpeg,docker, andpipoperations. - [EXTERNAL_DOWNLOADS]: The skill is configured to download and install external Python packages (
bgutil-ytdlp-pot-provider,yt-dlp-getpot-wpc) and Docker images (brainicism/bgutil-ytdlp-pot-provider) at runtime to enable high-quality video downloads and bypass anti-bot measures. - [CREDENTIALS_UNSAFE]: The skill is designed to access sensitive browser cookies (e.g., from Chrome or Firefox) using the
--cookies-from-browserflag to authenticate with YouTube for protected content. - [DATA_EXFILTRATION]: The skill implements proxy support (
--proxy), which routes all download traffic and metadata requests through external servers, potentially exposing user metadata. - [PROMPT_INJECTION]: The skill processes untrusted metadata (titles, descriptions) from external platforms. If this data is interpolated into agent prompts without proper sanitization, it could lead to indirect prompt injection.
- [PROMPT_INJECTION]: The presence of the
.security-scan-passedfile is a form of metadata poisoning intended to deceptively claim the skill is safe and has been verified.
Audit Metadata