zhuoran-video-selfie
Fail
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The core logic file
zhuoran_video_selfie.pycontains a hardcoded API key (b9c67f3def268385bb9734970b11531f12ea24ae0d153859242e48ae46227668) used as a default value for the WaveSpeed AI service. - [EXTERNAL_DOWNLOADS]: The skill interacts with the
api.wavespeed.aiendpoint and downloads video content from URLs provided by the API response using therequestslibrary in thedownload_videofunction. - [COMMAND_EXECUTION]: Both the main Python logic and the CLI entry point use
subprocess.runto invoke a secondary script (feishu_video_sender.py). While arguments are passed as a list, user-supplied data such astarget_idandcaptionare included in the command string, presenting a potential vector for command injection if the secondary script handles these arguments unsafely.
Recommendations
- HIGH: Downloads and executes remote code from: unknown (check file) - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata