paw-cra-video-shortform
Fail
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions in
references/production.mdandreferences/validation-export.mddefine shell command templates forffmpeg,egaki, andcurlthat directly interpolate user-controlled variables. - Evidence:
- In Step 5:
egaki video --model veo-3.1 --prompt "{visual_description}" ...— The{visual_description}originates from the user brief or an AI-generated storyboard and is not sanitized before being placed in a shell command. - In Step 6:
curl -X POST ... -d '{"text": "{voiceover_line}", ...}'— The{voiceover_line}(script content) is interpolated into a JSON payload within a curl command. Maliciously crafted script lines containing quotes or shell metacharacters could break out of the string literal. - In Step 8:
ffmpeg ... -vf "subtitles=subs.srt:force_style='FontName={brand_font},...'"— The{brand_font}variable is loaded from local configuration files and inserted into a complex ffmpeg filter string, posing a risk if the configuration is compromised. - In Step 10: Filenames are generated using
{topic-slug}, which is derived from user input. This could lead to path traversal or command injection if the slugging process is insufficient. - [DATA_EXFILTRATION]: The skill is designed to load and utilize sensitive API keys (
fal_key,elevenlabs_api_key) from configuration files. While these are sent to the intended well-known services (fal.ai and ElevenLabs), the presence of command injection vulnerabilities significantly increases the risk that these credentials could be exfiltrated to an attacker-controlled server. - [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted external data (user briefs and scripts) and uses it to drive high-privilege tools like
ffmpegandcurl. - Ingestion points:
references/pre-production.md(Step 1: Brief Intake). - Boundary markers: Absent. The instructions do not specify the use of delimiters or warnings to ignore instructions embedded within the user-provided brief.
- Capability inventory:
egaki(AI video generation),curl(API communication),ffmpeg(video processing), and file system writes for video assets and manifests. - Sanitization: Absent. There is no mention of escaping shell characters, validating input length, or filtering malicious patterns in the user-provided scripts or descriptions.
Recommendations
- AI detected serious security threats
Audit Metadata