upload-post
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- DATA_EXFILTRATION (MEDIUM): The
scripts/upload_video.shscript is vulnerable to local file exfiltration. It utilizescurl -Fto handle platform-specific comments without sanitizing the input. Becausecurlinterprets field values starting with the@or<characters as file paths to be uploaded or read, a malicious payload in theplatform-commentsargument (e.g.,{"instagram": "@/etc/passwd"}) would cause the script to upload sensitive system files to the API endpoint. - COMMAND_EXECUTION (LOW): The
scripts/upload_video.shscript performs unsafe word splitting. It parses JSON using apython3one-liner and stores the result in a variable (FIELDS) which is then iterated over without quotes (for field in $FIELDS). This allows a crafted JSON input to inject additional arguments into thecurlcommand, potentially altering its behavior or bypassing intended logic. - CREDENTIALS_UNSAFE (LOW): The skill documentation and both included scripts encourage users to provide the
API_KEYas a command-line argument. This practice is insecure as command-line arguments are often visible to other users on the same system via process monitoring tools likepsortop. - DATA_EXFILTRATION (LOW): The skill presents an Indirect Prompt Injection surface. It ingests untrusted data (titles, descriptions, and comments) and passes them directly to a script with file-read capabilities (
curl) without sanitization, boundary markers, or validation of the input content.
Audit Metadata