visual-hook
Pass
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The script
_postplus_shared/00-core/shared-runtime/scripts/download_videos_from_manifest_with_ytdlp.mjsexecutespython3 -m yt_dlpvia a subprocess to download media content. This is a standard implementation for video retrieval. - [EXTERNAL_DOWNLOADS]: The skill is designed to download video files from external URLs provided in a JSON manifest for the purpose of analyzing visual hooks. This is an intended capability of the toolset.
- [DATA_EXFILTRATION]: The library
_postplus_shared/00-core/shared-runtime/scripts/lib/postplus_cli_config.mjsreads the user's local PostPlus configuration file to retrieve authentication tokens, which are then used to communicate with the vendor's API. This represents standard authentication for the PostPlusAI ecosystem and follows the author's established resource patterns.
Audit Metadata