Security Audit
sundial-org/awesome-openclaw-skills:skills/ai-video-gen
github.com/sundial-org/awesome-openclaw-skillsTrust Assessment
sundial-org/awesome-openclaw-skills:skills/ai-video-gen received a trust score of 0/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 21 findings: 7 critical, 8 high, 6 medium, and 0 low severity. Key findings include Network egress to untrusted endpoints, Unsafe environment variable passthrough, Arbitrary command execution.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 0/100, indicating areas for improvement.
Last analyzed on March 3, 2026 (commit 6d998e00). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings21
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Network egress to untrusted endpoints Python requests POST/PUT to URL Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/ai-video-gen/generate_video.py:106 | |
| CRITICAL | Arbitrary command execution Python shell execution (os.system, subprocess) Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/ai-video-gen/add_voiceover.py:70 | |
| CRITICAL | Arbitrary command execution Python shell execution (os.system, subprocess) Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/ai-video-gen/generate_video.py:180 | |
| CRITICAL | Arbitrary command execution Python shell execution (os.system, subprocess) Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/ai-video-gen/images_to_video.py:47 | |
| CRITICAL | Credential harvesting Reading well-known credential environment variables Skills should only access environment variables they explicitly need. Bulk environment dumps (os.environ.copy, JSON.stringify(process.env)) are almost always malicious. Remove access to Keychain, GPG keys, and credential stores. | Manifest | skills/ai-video-gen/add_voiceover.py:18 | |
| CRITICAL | Credential harvesting Reading well-known credential environment variables Skills should only access environment variables they explicitly need. Bulk environment dumps (os.environ.copy, JSON.stringify(process.env)) are almost always malicious. Remove access to Keychain, GPG keys, and credential stores. | Manifest | skills/ai-video-gen/generate_video.py:19 | |
| CRITICAL | FFmpeg Command Injection via Unsanitized File List The `images_to_video.py` script constructs a temporary file (`filelist.txt`) containing user-provided image paths. These paths are enclosed in single quotes within the file. If an attacker provides an image filename containing a single quote, they can break out of the quoted string and inject arbitrary FFmpeg commands or options into the file list. FFmpeg is then called with the `-safe 0` option, which explicitly disables security checks for the concat demuxer, making it vulnerable to such injections. This allows for arbitrary command execution within the FFmpeg context, potentially leading to data exfiltration, denial of service, or further system compromise. Sanitize user-provided image paths before writing them to the `filelist.txt`. Specifically, escape any single quotes within the path string. A safer approach would be to avoid constructing a file list with user-controlled content or to use a method that does not rely on the `-safe 0` FFmpeg option. For example, `str(Path(img).absolute()).replace("'", "\'")` could be used to escape single quotes. | Static | images_to_video.py:29 | |
| HIGH | Unsafe environment variable passthrough Access to well-known credential environment variables Minimize environment variable exposure. Only pass required, non-sensitive variables to MCP servers. Use dedicated secret management instead of environment passthrough. | Manifest | skills/ai-video-gen/add_voiceover.py:18 | |
| HIGH | Unsafe environment variable passthrough Access to well-known credential environment variables Minimize environment variable exposure. Only pass required, non-sensitive variables to MCP servers. Use dedicated secret management instead of environment passthrough. | Manifest | skills/ai-video-gen/generate_video.py:19 | |
| HIGH | Dangerous call: subprocess.run() Call to 'subprocess.run()' detected in function 'add_audio_to_video'. This can execute arbitrary code. Avoid using dangerous functions like exec/eval/os.system. Use safer alternatives. | Static | skills/ai-video-gen/add_voiceover.py:70 | |
| HIGH | Dangerous call: subprocess.run() Call to 'subprocess.run()' detected in function 'combine_video_audio'. This can execute arbitrary code. Avoid using dangerous functions like exec/eval/os.system. Use safer alternatives. | Static | skills/ai-video-gen/generate_video.py:180 | |
| HIGH | Potential data exfiltration: file read + network send Function 'generate_image_openai' reads files and sends data over the network. This may indicate data exfiltration. Review this function to ensure file contents are not being sent to external servers. | Static | skills/ai-video-gen/generate_video.py:54 | |
| HIGH | Potential data exfiltration: file read + network send Function 'generate_image_replicate' reads files and sends data over the network. This may indicate data exfiltration. Review this function to ensure file contents are not being sent to external servers. | Static | skills/ai-video-gen/generate_video.py:81 | |
| HIGH | Potential data exfiltration: file read + network send Function 'image_to_video_luma' reads files and sends data over the network. This may indicate data exfiltration. Review this function to ensure file contents are not being sent to external servers. | Static | skills/ai-video-gen/generate_video.py:136 | |
| HIGH | Dangerous call: subprocess.run() Call to 'subprocess.run()' detected in function 'images_to_video'. This can execute arbitrary code. Avoid using dangerous functions like exec/eval/os.system. Use safer alternatives. | Static | skills/ai-video-gen/images_to_video.py:47 | |
| MEDIUM | Suspicious import: requests Import of 'requests' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/ai-video-gen/generate_video.py:12 | |
| MEDIUM | Unpinned Python dependency version Requirement 'openai>=1.0.0' is not pinned to an exact version. Pin Python dependencies with '==<exact version>'. | Dependencies | skills/ai-video-gen/requirements.txt:1 | |
| MEDIUM | Unpinned Python dependency version Requirement 'replicate>=0.20.0' is not pinned to an exact version. Pin Python dependencies with '==<exact version>'. | Dependencies | skills/ai-video-gen/requirements.txt:2 | |
| MEDIUM | Unpinned Python dependency version Requirement 'requests>=2.31.0' is not pinned to an exact version. Pin Python dependencies with '==<exact version>'. | Dependencies | skills/ai-video-gen/requirements.txt:3 | |
| MEDIUM | Unpinned Python dependency version Requirement 'pillow>=10.0.0' is not pinned to an exact version. Pin Python dependencies with '==<exact version>'. | Dependencies | skills/ai-video-gen/requirements.txt:4 | |
| MEDIUM | Unpinned Python dependency version Requirement 'python-dotenv>=1.0.0' is not pinned to an exact version. Pin Python dependencies with '==<exact version>'. | Dependencies | skills/ai-video-gen/requirements.txt:5 |
Scan History
Embed Code
[](https://skillshield.io/report/af68f6e795ce1f34)
Powered by SkillShield