dashcam-frame-extraction
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) This package (manifest) appears to be a legitimate, local-only GPU frame-extraction toolkit for Movie_F dashcam videos. I found no manifest-level indicators of network exfiltration, obfuscated malware, or credential theft. Primary concerns are operational and privacy-related: hard-coded user paths that leak local structure, writing extracted frames to a Google Drive-synced directory (risk of unintended cloud upload), and a destructive emergency cleanup plus strict fail-on-first-error semantics that can cause data loss or processing interruption. Recommend a focused review of the actual script contents (particularly extract_frames_worker.py and run_extraction.sh) to verify safe handling of filenames, process invocation (no unsafely constructed shell commands), and that cleanup commands validate paths before deletion; also make paths configurable and document sync/privacy implications. LLM verification: The skill description is largely coherent with a GPU-accelerated frame extraction workflow for dashcam videos, but several red flags exist: (a) documented use of destructive commands (rm -rf, chmod 777) in SKILL.md raises concerns about safe engineering practices or potential for misuse; (b) lack of visible secure credential handling or provenance for Google Drive uploads; (c) reliance on local paths and multiple shell scripts without source-verification increases supply-chain risk. Overall, the