video-frames
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
video-frames.jsfile contains a command injection vulnerability in thevalidateVideofunction.\n - Evidence: It uses
execSyncwith a template literal to executeffprobe, directly embedding theinputFilevariable:execSync(`ffprobe -v error -print_format json -show_format -show_streams "${inputFile}"`, ...). A filename containing shell metacharacters such as;or$(...)will trigger arbitrary command execution on the host system.\n- [COMMAND_EXECUTION]: Dangerous use of theeval()function invideo-frames.js.\n - Evidence: The code uses
eval(videoStream.r_frame_rate)to parse the frame rate string returned byffprobe. This allows for arbitrary code execution if the video file contains malicious metadata that influences the output offfprobe.\n- [COMMAND_EXECUTION]: The shell scriptsframe.sh,gif.sh, andthumbnails.shuse unvalidated user input in system commands.\n - Evidence: These scripts pass variables like
$VIDEOand$OUTdirectly toffmpegandffprobe. While quoted, they do not perform sufficient sanitization to prevent shell-based attacks in all environments.\n- [COMMAND_EXECUTION]: Inthumbnails.sh, the script passes tool output and user-provided counts into apython3command string for execution.\n - Evidence:
INTERVAL=$(python3 -c "print($DURATION / ($COUNT + 1))"). This creates a vulnerability where malicious values in the$DURATIONor$COUNTvariables could result in arbitrary code execution within the Python interpreter.
Recommendations
- AI detected serious security threats
Audit Metadata