video-frames
Warn
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/frame.shis vulnerable to command injection via the--index,--time, and--outparameters. These values are interpolated directly into shell commands and ffmpeg filtergraphs without sufficient sanitization, which could allow an attacker to execute arbitrary shell commands or manipulate video processing filters. \n - Ingestion points: Command-line arguments processed in
scripts/frame.sh. \n - Boundary markers: None; the parameters are used directly within shell strings and subshells. \n
- Capability inventory: The script executes
ffmpegandmkdirwith subshell calls todirname. \n - Sanitization: Incomplete; while variables are double-quoted in some places, the script does not prevent subshell expansion (e.g., within the
--outpath) or escaping of the ffmpeg filtergraph syntax. \n- [PROMPT_INJECTION]: TheSKILL.mdfile contains a commercial pricing table and contact information for paid video services. This is a form of metadata poisoning that is irrelevant to the skill's technical purpose and serves as promotional clutter for the agent.
Audit Metadata