media-downloader
Warn
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The
scripts/download.pyfile usessubprocess.runto call theyt-dlpbinary. While arguments are passed as a list to prevent shell injection, the underlying tool has extensive permissions to interact with the network and file system. - [REMOTE_CODE_EXECUTION] (MEDIUM): The
SKILL.mdfile encourages the use ofyt-dlp -U. This command triggers a self-update process that downloads and executes code from remote servers at runtime, which is an unverified external download. - [CREDENTIALS_UNSAFE] (MEDIUM): The skill documentation and the
scripts/download.pywrapper support the--cookies-from-browserfeature. This allows the tool to read sensitive session cookies from user browser profiles (e.g., Chrome, Firefox) to access restricted content, which could be exploited to expose user credentials. - [PROMPT_INJECTION] (LOW): The skill is susceptible to indirect prompt injection as it ingests untrusted URLs.
- Ingestion points:
urlargument inscripts/download.py. - Boundary markers: Absent; the URL is passed directly to the command line.
- Capability inventory: File writing, network access, and subprocess execution via
yt-dlp. - Sanitization: Uses list-based
subprocess.runcalls to prevent shell-level injection, but does not sanitize the content of the URL or potential metadata returned by the downloader.
Audit Metadata