remotion-best-practices
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The file
rules/troubleshooting.md(referenced as a critical rule inSKILL.md) provides a complete Bash script template (scripts/trim-videos.sh). It explicitly instructs the agent or user to make the script executable usingchmod +xand run it locally. The script executes several binaries includingffmpegandffprobe, and performs file system operations likemkdir -pand file redirections. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection (Category 8).
- Ingestion points: Files such as
rules/calculate-metadata.mdandrules/import-srt-captions.mddemonstrate fetching data from external URLs (e.g.,props.dataUrlor remote.srtfiles) which is then used to determine composition duration or rendered text. - Boundary markers: The code examples do not include boundary markers or instructions to the LLM to ignore potentially malicious content within the fetched data.
- Capability inventory: The skill encourages the creation and execution of shell scripts (
rules/troubleshooting.md) and uses the Remotion framework, which typically invokesffmpegfor rendering. - Sanitization: There is no evidence of sanitization, escaping, or validation of the external data before it is processed or interpolated into the video composition.
- [EXTERNAL_DOWNLOADS]: The skill frequently instructs the agent to install external packages using
npx remotion add,npm install, oryarn add. While these target the legitimate Remotion ecosystem and well-known libraries (e.g.,zod,mapbox-gl), they represent external dependencies. Additionally,rules/tailwind.mdinstructs the agent to fetch instructions fromhttps://www.remotion.dev/docs/tailwindat runtime.
Audit Metadata