youtube-transcribe-skill
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill directly interpolates user-provided input (
[VIDEO_URL]) into shell commands (yt-dlp --get-title "[VIDEO_URL]"). Although wrapped in quotes, this is a significant injection vector if the agent does not perform strict sanitization of shell-sensitive characters like backticks, subshell tokens, or semicolons. - [CREDENTIALS_UNSAFE] (HIGH): The instructions explicitly require the use of
--cookies-from-browser=chrome. This grants theyt-dlptool (and the agent by extension) access to the user's browser profile, which contains sensitive session cookies, authentication tokens, and private user data across all logged-in sites. - [PROMPT_INJECTION] (MEDIUM): Category 8 (Indirect Prompt Injection). The skill is designed to ingest untrusted data from an external source (YouTube transcripts) via
mcp__chrome__evaluate_script. - Ingestion points: YouTube transcript segments fetched from the DOM in Step 3.5.
- Boundary markers: Absent. The data is joined as raw text and passed to a file-writing tool.
- Capability inventory: Subprocess calls (
yt-dlp), file-write capabilities, and browser automation. - Sanitization: Absent. The script directly extracts
innerTextwithout filtering for potential instructions. - [COMMAND_EXECUTION] (MEDIUM): Step 3.5 uses
mcp__chrome__evaluate_scriptto run arbitrary JavaScript in a browser context. While standard for automation, it increases the attack surface if the script logic is manipulated by injected page content.
Recommendations
- AI detected serious security threats
Audit Metadata