faion-multimodal-ai
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The VideoProcessor class in
video-gen-basics/README.mdusessubprocess.runto interact with system tools likeffmpegandffprobe. In theconcatenate_videosmethod, input paths are written to a temporary list file using basic single-quote wrapping (f"file '{path}'\n"). A maliciously crafted filename containing a single quote could escape the directive and potentially injectffmpegoptions or access unauthorized files. - [PROMPT_INJECTION] (LOW): In
vision-basics/README.md, theVisualQAimplementation and thestructured_analysisfunction interpolate user-provided strings directly into LLM prompt content without sanitization or boundary markers. This creates a surface for both direct and indirect prompt injection attacks where untrusted data could override agent instructions. - [DATA_EXPOSURE] (LOW): The skill utilizes hardcoded temporary file paths, such as
/tmp/video_list.txtinvideo-gen-basics/README.md. Predictable paths in shared directories can lead to local data leakage or resource collision issues in multi-user environments.
Audit Metadata