youtube-transcript

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [HIGH] command_injection: Reference to external script with install/setup context (SC005) BENIGN: The chosen report presents a coherent, consent-aware, multi-path transcript extraction workflow with appropriate validation, sanitization, and transformation steps. It balances quality (manual > auto > Whisper) with privacy controls. While some edge-case handling and automation of prompts could be improved, there is no evidence of malicious activity or data leakage beyond producing transcripts within a controlled workflow. LLM verification: This skill is functionally consistent with its stated purpose and does not contain obvious signs of malware or credential harvesting. Primary risks are supply-chain and operational: the documentation recommends a pipe-to-shell installer for UV (curl | sh), suggests disabling certificate checks in some failure modes, and relies heavily on 'uv run' to invoke external tools — if the UV-managed tools or the install script are compromised, the skill would execute them. No hardcoded credentials, obfus

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 10:46 AM
Package URL
pkg:socket/skills-sh/ryanhudson%2Ftapestry-skills-for-claude-code%2Fyoutube-transcript%2F@906d43cf6934d68851cea8ca87be9b743988ebc4