gifgrep
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The functions
extractStillandcreateContactSheetingifgrep.jsuseexecSyncto runffmpegcommands. Multiple parameters, includingtimestamp,width,columns, andoutput, are interpolated directly into the command string without sanitization. This allows an attacker to execute arbitrary shell commands by providing malicious input values. - [EXTERNAL_DOWNLOADS]: The
downloadandrequestmethods ingifgrep.jsfetch content from arbitrary URLs provided at runtime. This creates an attack surface for downloading untrusted content onto the host system or performing Server-Side Request Forgery (SSRF) against internal network resources. - [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection.
- Ingestion points: Data is ingested from external API responses (GIPHY and Tenor) via the
searchandgetTrendingfunctions ingifgrep.js. - Boundary markers: No delimiters or safety instructions are used when handling data retrieved from external GIF providers.
- Capability inventory: The skill has the capability to execute shell commands via
execSync, perform network operations viahttps.get, and write to the local filesystem. - Sanitization: There is no evidence of sanitization or validation of data retrieved from external APIs before it is potentially used in downstream operations or shell command interpolation.
Recommendations
- AI detected serious security threats
Audit Metadata