youtube-transcript
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
sudo apt update && sudo apt install -y yt-dlpto install system dependencies on Linux, which requires elevated administrative privileges. - [EXTERNAL_DOWNLOADS]: It attempts to download and install external software packages including
yt-dlpandopenai-whisperfrom public registries usingpip,brew, oraptif they are not already installed. - [COMMAND_EXECUTION]: The skill executes various shell commands to extract video metadata, download media, and perform file system operations. It also runs a Python script via
python3 -cusing shell variables ($VTT_FILE,$VIDEO_TITLE) which are interpolated directly into the command string, potentially allowing for command breakage if filenames contain special characters. - [PROMPT_INJECTION]: The skill processes untrusted data from YouTube video transcripts, creating a surface for indirect prompt injection attacks where malicious instructions in a video's captions could influence the agent's behavior.
- Ingestion points: Reads content from
.vttsubtitle files downloaded from YouTube (file names liketranscript_temp.en.vtt). - Boundary markers: None; the transcript text is processed and saved to a
.txtfile without using delimiters to separate the data from instructions. - Capability inventory: The skill has access to
Bash,Read, andWritetools, providing a broad execution environment. - Sanitization: Performs basic regex-based cleaning to remove HTML-like tags and deduplicate lines, but does not sanitize for agent-specific injection patterns.
Audit Metadata