jianying-editor
Fail
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
README.mdfile contains a 'One-Click Installation' command for Windows:irm is.gd/rpb65M | iex. - This pattern downloads content from a shortened, unverified URL and immediately executes it in the shell environment without verification.
- [COMMAND_EXECUTION]: The skill makes extensive use of
subprocesscalls to interact with the system and external tools. tools/recording/recorder.pyspawnsffmpegfor screen recording and callssys.executableto run editing scripts.scripts/utils/media_normalizer.pyandscripts/api_validator.pyexecuteffmpegandffproberespectively.examples/video_transcribe_and_match.pyexecutes another Python script (chat.py) from a separate skill folder.- [EXTERNAL_DOWNLOADS]: The skill implements automated downloading of media assets.
scripts/cloud_manager.pydownloads video and audio files from URLs found in local database CSVs or extracted from Jianying logs.scripts/universal_tts.pyfetches generated audio from ByteDance's SAMI service (sami.bytedance.com) using WebSockets.- While the
CloudManagerimplements some hostname validation (blocking localhost and private IPs), it still allows downloading and executing binary media assets from remote servers.
Recommendations
- AI detected serious security threats
Audit Metadata