paw-cra-video-longform
Warn
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
validate-video.pyscript generates JSON output containing a 'fix' field with suggested shell commands (e.g.,ffmpeg -i {video_path} ...). TheSKILL.mdinstructions explicitly direct the agent to 'attempt auto-fix' based on validation results. Because thevideo_pathis interpolated directly into these strings, a maliciously named file containing shell metacharacters could lead to arbitrary command execution when the agent attempts to run the suggested fix. - [COMMAND_EXECUTION]: The skill relies on executing system utilities such as
ffmpeg,ffprobe, and theegakiCLI. The Python scripts usesubprocess.runto call these tools; while they use argument lists to prevent shell injection during the script's own execution, they operate on paths and configurations that can be influenced by external inputs. - [EXTERNAL_DOWNLOADS]: The production workflow involves significant interaction with external APIs, including fal.ai for video generation, ElevenLabs for voiceover synthesis, and Pexels for stock footage. These are well-known services used for their intended purpose within the video production context.
Audit Metadata