youtube-downloader
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): The script
scripts/download_video.pyautomatically installs theyt-dlppackage usingpipat runtime if it's not detected. This bypasses static dependency checks and introduces a risk of installing malicious packages if the environment or registry is compromised. - COMMAND_EXECUTION (MEDIUM): The skill executes external commands using
subprocess.run. Although it passes arguments as a list (mitigating shell injection), it still runs a complex external tool (yt-dlp) on untrusted input (URLs). This could potentially expose the system to vulnerabilities withinyt-dlpor its dependencies. - INDIRECT_PROMPT_INJECTION (LOW): The skill ingests untrusted data and passes it to an external process.
- Ingestion points:
urlargument inscripts/download_video.py. - Boundary markers: None (the URL is used directly).
- Capability inventory:
subprocess.runto execute system commands. - Sanitization: Uses argument lists for
subprocess.run, which prevents direct shell injection but does not sanitize the URL content processed byyt-dlp.
- Ingestion points:
- PROMPT_INJECTION (SAFE): No evidence of malicious prompt overrides or instructions to bypass safety filters were found in the provided files.
Audit Metadata