ai-multimodal
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: In
scripts/media_optimizer.py, the skill uses theeval()function to parse ther_frame_ratemetadata field returned byffprobe. While this is intended to convert fractional strings (e.g., '30/1') into floats, executing code on data derived from external file metadata is a security risk if the metadata can be manipulated to contain malicious Python expressions. - [COMMAND_EXECUTION]: The skill relies on
subprocess.runto executeffmpegandffprobefor media optimization and metadata extraction. Although it uses list-based arguments which mitigate shell injection, the execution of complex external binaries on untrusted user-provided media files poses an inherent risk of exploiting vulnerabilities in those codecs. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted data from various media formats.
- Ingestion points:
scripts/document_converter.pyandscripts/gemini_batch_process.pyread content from PDFs, images, audio, and video files. - Boundary markers: The prompts used for document conversion and analysis lack explicit boundary markers or 'ignore' instructions for embedded content.
- Capability inventory: The skill possesses capabilities to read/write files and execute subprocesses (
ffmpeg), which could be targeted by injected instructions. - Sanitization: No sanitization or validation of the content extracted from media files is performed before passing it to the LLM.
Audit Metadata