media-files-conversion-ffmpeg
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill performs system operations by calling the ffmpeg binary directly and through a provided Python utility script (scripts/ffmpeg_helper.py). The helper script utilizes subprocess.run() to execute commands. The implementation follows security best practices by passing command arguments as a list rather than a shell string, effectively preventing common shell injection vectors.\n- [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection as it processes external files (media) and user-provided strings (filenames, timestamps) which could theoretically contain malicious content designed to influence agent behavior. Ingestion points: Filenames and command-line arguments provided to the scripts/ffmpeg_helper.py script. Boundary markers: Absent; there are no specific instructions to the agent to ignore content within processed file metadata. Capability inventory: File system access and system command execution via subprocess.run in scripts/ffmpeg_helper.py. Sanitization: The use of list-based arguments in subprocess.run provides technical isolation from shell interpolation, but the skill does not perform logic-level sanitization of input strings.\n- [SAFE]: Extensive analysis of the skill's logic, scripts, and documentation revealed no evidence of data exfiltration, credential theft, persistence mechanisms, or obfuscated content.
Audit Metadata