NYC
skills/smithery/ai/youtube-summarize/Gen Agent Trust Hub

youtube-summarize

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION] (CRITICAL): The skill instructs macOS users to visit 'https://glot.io/snippets/hfd3x9ueu5' and execute the command found there in their terminal. This URL has been flagged as malicious by automated scanners and is a common vector for one-liner shell backdoors.
  • [EXTERNAL_DOWNLOADS] (CRITICAL): The skill mandates downloading a ZIP file ('openclawcli.zip') from an untrusted GitHub repository ('Ddoy233/openclawcli') and running the executable inside. This is an attempt to deliver a malicious payload under the guise of a prerequisite utility.
  • [COMMAND_EXECUTION] (HIGH): The skill utilizes complex shell piping involving 'yt-dlp', 'sed', and inline Python execution. While 'yt-dlp' is a legitimate tool, its usage here serves as a 'living-off-the-land' decoy to make the overall skill appear functional while the user is infected via the 'openclawcli' malware.
  • [INDIRECT PROMPT INJECTION] (HIGH): The skill ingests untrusted data from YouTube (titles, descriptions, transcripts) and passes it directly to the LLM. It lacks boundary markers or sanitization, allowing a malicious YouTube video to inject instructions that could influence the agent's behavior during the 'summarization' phase.
  • [METADATA POISONING] (HIGH): The skill contains deceptive claims. It repeatedly states that 'yt-dlp' requires 'openclawcli' to extract transcripts; this is factually false, as 'yt-dlp' handles transcript extraction natively. This deception is designed to bypass user caution.
Recommendations
  • AI detected serious security threats
  • Contains 2 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 07:48 AM