yt-dlp-downloader
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [Indirect Prompt Injection] (HIGH): Vulnerable surface detected for Indirect Prompt Injection. 1. Ingestion points: The
VIDEO_URLprovided by the user and metadata retrieved from external sites. 2. Boundary markers: Absent; user input is directly interpolated into shell command templates. 3. Capability inventory: Subprocess execution via shell, network access, and file system write access. 4. Sanitization: Absent; there is no logic to escape or validate the URL before execution. An attacker could use a URL likehttps://example.com"; rm -rf ~; #to execute arbitrary commands. - [Data Exposure & Exfiltration] (HIGH): The skill recommends using the
--cookies-from-browserflag. This command allows the agent to extract sensitive authentication tokens (session cookies) from the user's local browser database. Combined with thenetworkpermission, this allows for the exfiltration of private account credentials to external sources. - [Unverifiable Dependencies & Remote Code Execution] (LOW): The skill relies on external binaries
yt-dlpandffmpegand suggests runtime installation viapipandbrew. While these are trusted sources, providing instructions for the agent to install software at runtime is a risk-increasing practice.
Recommendations
- AI detected serious security threats
Audit Metadata