capture-video-frames
Pass
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes external CLI tools (yt-dlp, ffmpeg, and ffprobe) to process video data.
- Evidence: The script
capture_video_frames.pyuses list-based arguments insubprocess.run(), avoiding shell injection vulnerabilities. - Evidence: User-supplied
youtube_urlarguments are validated against a specific regular expression in theextract_video_idfunction before being used in commands. - [PROMPT_INJECTION]: The skill uses a subagent to generate descriptions which are then reused in subsequent prompts, creating an indirect prompt injection surface.
- Ingestion points: The agent reads
frames_manifest.md, which contains previously generated descriptions, to provide context for the next frame's analysis. - Boundary markers: The prompt template in
SKILL.mdwraps the potentially untrusted previous description in double quotes:"[PREVIOUS_DESCRIPTION]". - Capability inventory: The skill can execute file writes and run local CLI tools via the provided Python script.
- Sanitization: No specific escaping or content filtering is applied to the frame descriptions before they are interpolated into new prompts.
Audit Metadata