youtube-transcript
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructions and the script both explicitly download a binary file from a remote URL (
https://github.com/yt-dlp/yt-dlp/releases/latest/download/yt-dlp_macos) to a temporary location (/tmp/yt-dlp). - [REMOTE_CODE_EXECUTION]: The skill downloads an executable binary from GitHub and immediately grants it execution permissions (
chmod +x) before running it. This pattern of 'download-and-execute' is a high-risk vector for remote code execution. - [COMMAND_EXECUTION]: The script
fetch-transcript.mjsuseschild_process.execSyncto run the downloadedyt-dlpbinary. It interpolates the user-provided YouTube URL directly into the shell command string (e.g.,`${ytdlp} ... "${url}"`), which could lead to command injection if the input is not strictly validated, although double-quoting provides some mitigation.
Recommendations
- HIGH: Downloads and executes remote code from: https://github.com/yt-dlp/yt-dlp/releases/latest/download/yt-dlp_macos - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata