youtube-transcript

Fail

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill instructions and the script both explicitly download a binary file from a remote URL (https://github.com/yt-dlp/yt-dlp/releases/latest/download/yt-dlp_macos) to a temporary location (/tmp/yt-dlp).
  • [REMOTE_CODE_EXECUTION]: The skill downloads an executable binary from GitHub and immediately grants it execution permissions (chmod +x) before running it. This pattern of 'download-and-execute' is a high-risk vector for remote code execution.
  • [COMMAND_EXECUTION]: The script fetch-transcript.mjs uses child_process.execSync to run the downloaded yt-dlp binary. It interpolates the user-provided YouTube URL directly into the shell command string (e.g., `${ytdlp} ... "${url}"`), which could lead to command injection if the input is not strictly validated, although double-quoting provides some mitigation.
Recommendations
  • HIGH: Downloads and executes remote code from: https://github.com/yt-dlp/yt-dlp/releases/latest/download/yt-dlp_macos - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 10, 2026, 03:33 AM