vss-frag
Generates video summary reports using the VSS video_search_frag extension, enhancing video analysis with advanced retrieval techniques.
Install this skill
Security score
The vss-frag skill was audited on May 16, 2026 and we found 35 security issues across 4 threat categories. Review the findings below before installing.
Categories Tested
Security Issues
Template literal with variable interpolation in command context
| 84 | ```bash |
Template literal with variable interpolation in command context
| 147 | ```bash |
Template literal with variable interpolation in command context
| 175 | ```bash |
Template literal with variable interpolation in command context
| 192 | ```bash |
Template literal with variable interpolation in command context
| 201 | ```bash |
Template literal with variable interpolation in command context
| 219 | ```bash |
Template literal with variable interpolation in command context
| 239 | ```bash |
Template literal with variable interpolation in command context
| 247 | ```bash |
Curl to non-GitHub URL
| 89 | curl -sf --max-time 5 "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/health" >/dev/null \ |
Curl to non-GitHub URL
| 148 | curl -sS -X POST "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/v1/chat" \ |
Curl to non-GitHub URL
| 176 | curl -sS -X POST "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/v1/chat" \ |
Curl to non-GitHub URL
| 202 | curl -sS "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/executions/EXECUTION_ID" | python3 -m json.tool |
Curl to non-GitHub URL
| 220 | curl -sS "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/executions/EXECUTION_ID" | python3 -m json.tool |
Curl to non-GitHub URL
| 240 | curl -sS "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/health" |
Curl to non-GitHub URL
| 248 | curl -sS -X POST "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/v1/chat" \ |
Access to .env file
| 24 | > **Environment variables:** All commands use values from the `.env` file at |
Access to .env file
| 25 | > `deployments/developer-workflow/dev-profile-lvs/.env`. Edit it before deploying. |
Access to .env file
| 29 | ### Step 1: Configure the .env file |
Access to .env file
| 32 | nano deployments/developer-workflow/dev-profile-lvs/.env |
Access to .env file
| 61 | --env-file ../deployments/developer-workflow/dev-profile-lvs/.env \ |
Access to .env file
| 74 | --env-file ../deployments/developer-workflow/dev-profile-lvs/.env \ |
Access to .env file
| 100 | --env-file ../deployments/developer-workflow/dev-profile-lvs/.env \ |
Access to .env file
| 112 | --env-file ../deployments/developer-workflow/dev-profile-lvs/.env \ |
Access to .env file
| 118 | --env-file ../deployments/developer-workflow/dev-profile-lvs/.env \ |
Access to .env file
| 125 | --env-file ../deployments/developer-workflow/dev-profile-lvs/.env \ |
External URL reference
| 37 | - `NGC_CLI_API_KEY` — from https://ngc.nvidia.com/ |
External URL reference
| 38 | - `NVIDIA_API_KEY` — from https://build.nvidia.com/ |
External URL reference
| 89 | curl -sf --max-time 5 "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/health" >/dev/null \ |
External URL reference
| 148 | curl -sS -X POST "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/v1/chat" \ |
External URL reference
| 176 | curl -sS -X POST "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/v1/chat" \ |
External URL reference
| 194 | "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/executions/EXECUTION_ID/interactions/INTERACTION_ID/response" \ |
External URL reference
| 202 | curl -sS "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/executions/EXECUTION_ID" | python3 -m json.tool |
External URL reference
| 220 | curl -sS "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/executions/EXECUTION_ID" | python3 -m json.tool |
External URL reference
| 240 | curl -sS "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/health" |
External URL reference
| 248 | curl -sS -X POST "http://${HOST_IP}:${VSS_AGENT_PORT:-8000}/v1/chat" \ |