baoyu-youtube-transcript
Pass
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script uses
spawnSyncto runyt-dlp,bun, orpython3. This is used to extract video data when the direct API path fails. The commands are constructed using predefined arguments and video IDs. - [EXTERNAL_DOWNLOADS]: The skill fetches video metadata, transcripts, and thumbnails from YouTube domains (
youtube.com,ytimg.com). These are standard operations for a transcription tool. - [REMOTE_CODE_EXECUTION]: When falling back to
yt-dlp, the skill includes the--remote-components ejs:githubflag. This flag directsyt-dlpto load components from a remote source, which is a form of dynamic code loading. - [PROMPT_INJECTION]: The skill processes untrusted text from YouTube transcripts and video descriptions. This creates a surface for indirect prompt injection where an attacker could place instructions in a video's captions to influence the AI's behavior during the speaker identification step.
- Ingestion points: Video descriptions and transcripts are loaded in
scripts/main.tsandscripts/youtube.ts. - Boundary markers: Instructions for post-processing are defined in
prompts/speaker-transcript.md, but there is no strong isolation between the instructions and the untrusted transcript data. - Capability inventory: The agent can perform file system writes and execute shell commands (via the transcription scripts).
- Sanitization: The skill implements basic tag stripping and character unescaping, but does not filter for logical or instructional content in the transcript text.
Audit Metadata