educational-video-creator
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The file scripts/render-keyframes.ts is vulnerable to shell command injection. It uses child_process.exec to run system commands where the compositionName and outputDir arguments are concatenated into a shell string without sanitization. An attacker can provide a malicious composition name containing shell metacharacters (e.g., ';', '&', '|') to execute arbitrary system commands. Evidence: 'const cmd =
npx remotion still --frame ${kf.frame} --output "${outputFile}" -- ${compositionName};' where compositionName is derived directly from process.argv[2]. - [EXTERNAL_DOWNLOADS] (MEDIUM): The assets/progress-template.md file contains a command to download and install a skill from a non-whitelisted GitHub repository (https://github.com/remotion-dev/skills), which violates the trusted source policy for external dependencies.
- [REMOTE_CODE_EXECUTION] (MEDIUM): The skill documentation (e.g., references/audio-guide.md and scripts/render-keyframes.ts) instructs users and agents to execute local Node.js scripts using npx tsx. This provides a clear execution vector for the identified command injection vulnerability.
Recommendations
- AI detected serious security threats
Audit Metadata