video-creator
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): Path Traversal Vulnerability.
- Multiple utility scripts (
scripts/video-status.py,scripts/path_manager.py,scripts/get_video_step_metadata.py, andscripts/validate_json.py) take a--topicargument and use it directly to construct file system paths using string concatenation orpathlib.Patharithmetic (e.g.,Path(base_dir) / topic / "video-status.json"). - In
resume-video.mdandexecute-video-step.md, the agent is explicitly instructed to ask the user for a topic name if one is not provided. An attacker can provide a string like../../to access sensitive files elsewhere on the system. - [DATA_EXFILTRATION] (MEDIUM): Unauthorized File Access.
- The
scripts/list-topics.pyscript enumerates directories. When coupled with the path traversal vulnerability, this can be exploited to map the file system structure. - [PROMPT_INJECTION] (LOW): Indirect Prompt Injection Surface.
- Ingestion points:
steps/user-input-step.md(Step 2) collects a script of up to 2000 characters from the user. - Boundary markers: Absent. The user-provided script is interpolated into prompts for subagents without delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill invokes subagents like
content_scene_generatorto generate React TSX code (steps/code-step.md) andasset_generatorto create SVGs (steps/assets-step.md). - Sanitization: Absent. There is no evidence of filtering or escaping the user's script before it is processed by the AI pipeline.
Recommendations
- AI detected serious security threats
Audit Metadata