Trust Assessment
video-analyzer received a trust score of 72/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 1 finding: 1 critical, 0 high, 0 medium, and 0 low severity. Key findings include Command Injection via unsanitized user input in shell script.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Command Injection via unsanitized user input in shell script The `scripts/extract_frames.sh` script directly interpolates user-controlled arguments (`VIDEO_PATH` and `OUTPUT_DIR`) into shell commands (`ffprobe`, `ffmpeg`, `mkdir`, `ls`). While double-quoting is used, it does not prevent command injection if the input contains shell metacharacters (e.g., `;`, `|`, `&`, `$(...)`, `` ` ``). An attacker can craft a malicious `video_path` or `output_dir` argument to execute arbitrary commands on the host system. For example, providing `video_path` as `evil.mp4; rm -rf /` would lead to the execution of `rm -rf /` after the `ffprobe` command. Implement robust input validation for `VIDEO_PATH` and `OUTPUT_DIR` to ensure they only contain safe characters (e.g., alphanumeric, hyphens, underscores, dots, slashes, but no shell metacharacters). Alternatively, use a programming language (e.g., Python) with safer subprocess execution methods that pass arguments as a list, preventing shell interpretation. If remaining in bash, consider using `printf %q` to properly quote arguments for shell execution, or strictly sanitize inputs before use. | LLM | scripts/extract_frames.sh:34 |
Scan History
Embed Code
[](https://skillshield.io/report/d31f7f94461b9b6d)
Powered by SkillShield