manga-style-video
Fail
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/manga_style_video.pyexplicitly disables SSL certificate verification by settingssl_context.verify_mode = ssl.CERT_NONE. This allows an attacker to intercept theARK_API_KEYsent in the HTTP Authorization header via a Man-in-the-Middle (MitM) attack. - [COMMAND_EXECUTION]: The script uses
subprocess.runto execute the systemcurlcommand. It passes avideo_urlretrieved from the remote API directly to the command line, which introduces risks associated with executing external binaries and potential argument injection if the API response were compromised. - [EXTERNAL_DOWNLOADS]: The skill interacts with
ark.cn-beijing.volces.com, which is the official API endpoint for Volcengine (ByteDance). While this is a well-known service provider, the lack of SSL verification significantly undermines the security of these downloads. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8).
- Ingestion points: User-provided video descriptions in the
promptargument withinscripts/manga_style_video.py. - Boundary markers: None; user input is directly concatenated with internal style strings.
- Capability inventory: Subprocess execution via
curland authenticated network requests. - Sanitization: No input sanitization or escaping is performed on the user prompt before it is sent to the AI model.
Recommendations
- HIGH: Downloads and executes remote code from: https://ark.cn-beijing.volces.com/api/v3 - DO NOT USE without thorough review
Audit Metadata