YouTube Digest
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill coherently fetches YouTube metadata and subtitles for summarization, with only normal setup and local-tool risks to notice.
This skill appears safe for its stated purpose. Before installing, review the dependency installation method, avoid unnecessary privileged installs, use a scoped output directory such as /tmp/youtube-digest, and ensure the agent treats video transcripts as content to summarize rather than instructions to obey.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A video transcript could contain prompt-like wording; the agent should summarize it instead of following any instructions inside the transcript.
The skill intentionally brings externally sourced subtitle/transcript text into the agent's context. This is purpose-aligned, but transcripts should be treated as untrusted video content, not as agent instructions.
If subtitles exist, read `summary.json` and the generated transcript file first.
Use the skill for summarization and Q&A, and keep the agent focused on treating retrieved captions as source material only.
The skill can make network requests through yt-dlp and create or overwrite files in the selected output directory.
The helper script invokes the external yt-dlp tool with user-supplied URL/proxy parameters and writes output files. This is central to the skill and uses argument lists rather than shell interpolation, but it is still local tool execution.
run(["yt-dlp"] + proxy_args + ["--dump-single-json", "--skip-download", args.url])
Run it only for videos you intend to process and use a temporary or clearly scoped output directory.
Installing dependencies this way requires trusting the upstream download endpoints and installer scripts.
The documented setup uses latest-version direct downloads and a curl-to-shell installer with system-level install paths. These are disclosed setup steps for expected dependencies, but they are not pinned or checksum-verified in the artifact.
sudo curl -L https://github.com/yt-dlp/yt-dlp/releases/latest/download/yt-dlp -o /usr/local/bin/yt-dlp ... curl -fsSL https://deno.land/install.sh | DENO_INSTALL=/usr/local sh
Prefer a trusted package manager or pinned versions with checksums, and approve privileged installs explicitly.
