yt-dlp-downloader
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The helper script
scripts/download.shis vulnerable to shell command injection. It constructs a command string containing the user-provided URL and executes it usingeval. This allows an attacker to execute arbitrary shell commands by crafting a malicious URL (e.g., using command substitution). - DATA_EXFILTRATION (MEDIUM): The skill directs the agent to access sensitive browser cookie databases using the
--cookies-from-browserflag. This exposes the user's private session data and authentication tokens. - EXTERNAL_DOWNLOADS (LOW): The skill requires the installation of external tools
yt-dlpandffmpegfrom third-party repositories. - PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection through malicious video URLs. Ingestion point: Video URLs provided by the user or found in data. Boundary markers: Minimal (double quotes in script). Capability inventory: Shell execution, network access, file writing. Sanitization: None observed in the provided shell script.
Recommendations
- AI detected serious security threats
Audit Metadata