video-analysis-workflow
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill processes untrusted external video files while possessing command execution capabilities, which can be exploited if the processing tools (kinemotion/FFmpeg) have vulnerabilities or if the video metadata contains injection payloads.
- Ingestion points: Video files processed via CLI commands (
<video>,videos/*.mp4) and Python API calls in SKILL.md. - Boundary markers: Absent. There are no instructions to the agent to treat video data as untrusted or to ignore embedded metadata.
- Capability inventory: Allowed tools include
Bash(uv run kinemotion:*),Read, andGlob. This provides a shell execution path for the results of the data processing. - Sanitization: Absent. While
ffmpegis suggested for rotation issues, there is no security-focused sanitization of the input files. - Unverifiable Dependencies (MEDIUM): The skill relies on the
kinemotionpackage, which is not from a trusted source or organization listed in the security policy. - Evidence: Use of
uv run kinemotionin analysis commands and the Python APIfrom kinemotion import ...in SKILL.md. - Command Execution (LOW): The skill requires shell access (
Bash) to function. While scoped tokinemotion:*, this still allows execution of arbitrary arguments passed to the third-party binary.
Recommendations
- AI detected serious security threats
Audit Metadata