video-clip-extractor
Fail
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fetches the
uvinstallation script fromastral.sh, which is a well-known developer tool provider. It also clones theopencliptool directly from the author's GitHub repository.- [COMMAND_EXECUTION]: The skill uses bash commands to sync project dependencies and execute thevideo_orchestrator.pyPython script for video highlight extraction.- [PROMPT_INJECTION]: The skill includes an indirect prompt injection surface because it processes untrusted transcripts and user-defined intent through an LLM. 1. Ingestion points: Video files, platform subtitles, and the--user-intentparameter. 2. Boundary markers: No specific delimiters or instructions are used to isolate the video content from the system prompt. 3. Capability inventory: The skill has the ability to clone repositories, install packages, and execute local scripts. 4. Sanitization: There is no documentation of content filtering or sanitization for ingested transcripts.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
Audit Metadata