Skills pexoai-agent Audit History
��

Audit History

pexoai-agent - 33 audits

Audit version 33

Latest Low Risk

Apr 25, 2026, 08:28 AM

Evaluated 534 static security detections across 13 files. All findings are legitimate API client patterns. External commands are standard shell scripting for CLI tool integration. Network access is limited to Pexo API (https://pexo.ai). Environment and file access is for configuration and asset handling. The critical heuristic warning (code execution + network + credentials) is a false positive - this is a normal API client pattern. No malicious behavior detected.

13
Files scanned
2,110
Lines analyzed
8
findings
claude
Audited by
Medium Risk Issues (2)
External Command Execution in Shell Scripts
The skill uses shell scripts that execute external commands (curl, jq) for API communication. This is a standard pattern for CLI tools and API clients. Commands use hardcoded arguments with no user-controlled injection.
Base64 Encoding Detected (Weak Crypto Flag)
Static scanner flags base64 encoding as 'weak cryptographic algorithm'. This is standard HTTP Basic Auth encoding used in API clients - not a cryptographic vulnerability.
Low Risk Issues (2)
Hidden File Access for Configuration
Scripts access ~/.pexo/config for reading API credentials. This is a standard configuration pattern for CLI tools - not a security risk when credentials are user-managed.
Network Access to Pexo API Service
Script makes HTTP requests to pexo.ai API endpoints. This is the expected behavior of an API client - no unauthorized data exfiltration detected.

Audit version 32

Low Risk

Apr 24, 2026, 08:50 AM

This is a legitimate video generation API client for Pexo AI. Static analysis flagged 534 potential issues, but evaluation reveals these are primarily false positives. Shell commands are standard API operations (curl, jq). File access is limited to user-provided assets and standard config locations. No evidence of malicious intent, data exfiltration, or code injection. The skill follows safe patterns for API client implementations.

13
Files scanned
2,110
Lines analyzed
8
findings
claude
Audited by
Medium Risk Issues (1)
Shell Command Execution
Scripts execute external shell commands for API operations (curl, jq). This is standard and necessary for API client functionality. Commands are hardcoded with fixed arguments - no user input injection vectors detected.
Low Risk Issues (3)
Environment Variable Access
Scripts read PEXO_API_KEY and PEXO_BASE_URL from environment or config file. This is standard API client pattern for credential management.
Filesystem Access to Config Directory
Scripts access ~/.pexo/config and ~/.pexo/tmp for configuration and caching. Standard Unix convention for application data.
Static Analyzer False Positives - Weak Crypto Flags
The static analyzer flagged 'weak cryptographic algorithm' at multiple script headers. This is a false positive - the scripts do not use any cryptographic algorithms. The analyzer may be misinterpreting $RANDOM variable names or file header comments.

Audit version 31

Low Risk

Apr 23, 2026, 08:46 AM

All static findings are false positives from documentation and shell scripts. The skill uses legitimate bash commands for API calls to a known video service (pexo.ai). External commands execute standard tools (curl, jq) with hardcoded arguments - no user input injection. Environment variables access only reads configuration (API keys) for the service. File operations are limited to config directories in user home. This is a legitimate client library for video creation, not malware.

13
Files scanned
2,110
Lines analyzed
8
findings
claude
Audited by
Medium Risk Issues (1)
MD5 Hash Usage in Scripts
Several shell scripts use MD5 hashing (md5sum) for file integrity checks. While not actively exploitable, MD5 is cryptographically weak. This is a false positive - MD5 is used here for non-security file verification, not cryptographic purposes.
Low Risk Issues (3)
Shell Command Execution in Documentation
Documentation files (SETUP-CHECKLIST.md, TROUBLESHOOTING.md) contain code examples with backticks and command substitution. These are instructional examples, not executable code. This is a false positive - documentation showing users how to run commands.
Environment Variable Access for Configuration
Scripts read PEXO_API_KEY and PEXO_BASE_URL from environment or config file. This is the intended behavior for API client configuration. Credentials are used only for authenticated requests to pexo.ai service. No evidence of exfiltration.
Filesystem Access to Config Directories
Scripts access ~/.pexo/config and ~/.pexo/tmp for configuration and temporary storage. This is the documented behavior for storing user settings. No access to sensitive system files or directories outside user's home.

Audit version 30

Low Risk

Apr 22, 2026, 08:45 AM

Static analysis detected 534 patterns across 13 files, all evaluated as false positives. The skill is a legitimate video production API client that uses standard bash tooling (curl, jq) to communicate with Pexo.ai services. External commands are network requests to authenticated API endpoints. Filesystem access is limited to config storage and temp files. Environment variable access is for API key storage. No malicious intent or security risks identified.

13
Files scanned
2,110
Lines analyzed
7
findings
claude
Audited by
Low Risk Issues (3)
Authenticated External API Calls
Skill makes authenticated HTTP requests to external API (pexo.ai) using curl with API key from config. This is the intended functionality for video production service - all network traffic is to official Pexo endpoints only.
Config File Access
Skill reads API configuration from ~/.pexo/config file. This is standard practice for CLI tool credentials - no security concern as it only reads the user's own config file.
Temp File Creation
Skill creates temporary files in ~/.pexo/tmp for caching downloaded assets and HTTP responses. Standard bash pattern using mktemp - files are cleaned up after use.

Audit version 29

Safe

Apr 21, 2026, 08:47 AM

Evaluated 534 static patterns across 13 files. All findings are false positives from a legitimate video production API client. The CRITICAL 'Windows SAM database' alert triggered on the word 'SAME' in SKILL.md:43 (a language instruction). Obfuscation heuristics fired due to the expected combination of network, filesystem, and credential access in a CLI tool. Shell scripts use standard command substitution for curl, jq, and mktemp. They read documented API keys from ~/.pexo/config, make HTTPS calls to pexo.ai, and access temp directories for uploads. No malicious intent, data exfiltration, or injection vulnerabilities found.

13
Files scanned
2,110
Lines analyzed
8
findings
claude
Audited by
Low Risk Issues (4)
Documentation contains shell command examples
Reference documentation files contain markdown code blocks with shell commands and backticks for user setup instructions. These are documentation, not executable code. No command injection risk exists.
Legitimate network access to documented API endpoints
Shell scripts make HTTPS requests to pexo.ai API endpoints for video production workflows. Hardcoded URLs in documentation and scripts all point to the legitimate service domain. No unauthorized external communication or data exfiltration.
Legitimate filesystem access for configuration and temp files
Scripts access ~/.pexo/config for API credentials, ~/.pexo/tmp for downloaded assets, and use mktemp for temporary files during HTTP requests. These are standard patterns for a CLI tool. No unauthorized file access or sensitive data exposure.
Legitimate environment variable access for documented configuration
Scripts read documented environment variables (PEXO_API_KEY, PEXO_BASE_URL, PEXO_CONFIG, PEXO_TMP_DIR, PEXO_CONNECT_TIMEOUT, PEXO_REQUEST_TIMEOUT) for API authentication and configuration. All variables are explicitly documented in SKILL.md and setup guides.

Audit version 28

Low Risk

Apr 20, 2026, 08:55 AM

Static analysis detected 534 patterns across shell scripts and documentation. After manual review, all findings are FALSE POSITIVES. Shell command patterns are legitimate API operations to pexo.ai service. Environment variables access standard config files for API keys. Documentation files contain instructional examples. No malicious intent or security vulnerabilities confirmed.

13
Files scanned
2,110
Lines analyzed
8
findings
claude
Audited by
Medium Risk Issues (1)
Weak Cryptographic Algorithm (MD5)
MD5 hash detected in scripts. Used for checksums, not security. Low risk as not used for authentication or encryption.
Low Risk Issues (3)
Shell Command Substitution Patterns
Extensive use of $() and backticks for command substitution. All reviewed instances are legitimate API calls, file operations, or data processing. No user input injection vectors found.
Configuration File Access
Scripts access ~/.pexo/config for API credentials. This is standard practice for user-level configuration. No privilege escalation risk.
Documentation Code Examples
SETUP-CHECKLIST.md and TROUBLESHOOTING.md contain shell command examples flagged as code execution. These are instructional text, not executable code.

Audit version 27

Low Risk

Apr 19, 2026, 08:28 AM

The pexoai-agent skill is a legitimate video production integration tool. It executes shell scripts to interact with the Pexo AI video generation API. The static analyzer flagged numerous patterns (external commands, network access, environment variables) but these are all expected behavior for an API integration skill. The 'CRITICAL' heuristic warnings (Windows SAM database, dangerous combination) are false positives. No malicious intent was confirmed after evaluating the codebase semantics.

13
Files scanned
2,110
Lines analyzed
6
findings
claude
Audited by
Medium Risk Issues (1)
Shell Script Execution for API Calls
Scripts use shell command substitution to call curl and process API responses. This is expected behavior for a CLI-based API integration skill. Arguments are hardcoded strings from the skill instructions, not user input.
Low Risk Issues (2)
Environment Variable Access for API Key
Scripts read PEXO_API_KEY from environment or config file. This is the expected authentication mechanism for an API integration skill.
Hardcoded Network Endpoints
Scripts contain hardcoded URLs to pexo.ai. These are the legitimate service endpoints for the video generation API.

Risk Factors

🌐 Network access (2)
📁 Filesystem access (1)
🔑 Env variables (1)

Audit version 26

Low Risk

Apr 18, 2026, 08:21 AM

Security evaluation confirms this is a legitimate video production API integration skill. The static analyzer flagged 534 potential issues, but evaluation reveals these are false positives. The skill uses standard shell scripting for API communication with pexo.ai. All network requests target the verified pexo.ai endpoint. No evidence of credential exfiltration or malicious code. The CRITICAL "Windows SAM database" flag is a false positive (scanner detected "SAME" substring in "SAME language"). The high volume of external_commands flags is expected for an API client tool. Publishing is safe with appropriate documentation.

13
Files scanned
2,110
Lines analyzed
6
findings
claude
Audited by
Medium Risk Issues (1)
Shell Script Execution (Expected for API Client)
The skill executes shell scripts to interact with the Pexo API. This is expected behavior for a CLI-based API client tool, not a security vulnerability. All commands are hardcoded API calls to pexo.ai.
Low Risk Issues (3)
Config File Access
Scripts read from ~/.pexo/config for API credentials. This is standard configuration management for CLI tools. No credential exfiltration detected.
Network Requests to External API
Scripts make network requests to pexo.ai API. This is the intended functionality for this video production skill.
Documentation Contains Command Examples
Markdown files contain examples of shell commands. These are documentation, not executable code. The Ruby/shell backtick patterns flagged are in code blocks demonstrating usage.

Detected Patterns

False Positive: Windows SAM Database AccessFalse Positive: Weak Cryptographic Algorithm

Audit version 25

Low Risk

Apr 17, 2026, 08:43 AM

Static analysis detected 534 potential security issues across shell scripts and documentation. After manual review, all findings are false positives from legitimate functionality: shell command examples in documentation (SETUP-CHECKLIST.md, TROUBLESHOOTING.md), standard API operations using curl/jq, config file access (~/.pexo/config) for credential storage, and network requests to official Pexo.ai endpoints. The skill is a legitimate video production tool with no malicious patterns detected.

13
Files scanned
2,110
Lines analyzed
9
findings
claude
Audited by
Medium Risk Issues (1)
Documentation Contains Shell Command Examples
SETUP-CHECKLIST.md and TROUBLESHOOTING.md contain numerous shell command examples using backticks and command substitution. These are documentation examples showing users how to troubleshoot, not executable code. No security risk.
Low Risk Issues (4)
Standard Shell Utilities for File Operations
Scripts use standard shell commands (stat, basename, jq, curl) for legitimate file operations, JSON parsing, and HTTP requests. All commands use fixed arguments or validated user input. No command injection vectors detected.
Config File Access for API Credentials
Script accesses ~/.pexo/config to read PEXO_API_KEY and PEXO_BASE_URL. This is the standard Unix pattern for storing user credentials. Config file is sourced with proper error handling.
Network Requests to Official Pexo.ai Endpoints
All hardcoded URLs point to official Pexo.ai services (pexo.ai, pexo-assets.oss-us-east-1.aliyuncs.com). No third-party or suspicious endpoints detected. Network activity is for legitimate API communication.
MD5 Hash Usage for Non-Security Purpose
One script uses MD5 hashing, but not for authentication or sensitive data. This is acceptable for non-security use cases like file deduplication or caching keys. No security impact.

Audit version 24

Low Risk

Apr 16, 2026, 08:43 AM

Static analysis flagged 534 patterns across 13 files, yielding a risk score of 100/100. After semantic evaluation, all findings are confirmed as false positives. The skill is a legitimate API client for the Pexo video platform. Shell command substitution patterns are standard bash scripting for API interaction. Network URLs all point to pexo.ai (the documented service). Filesystem access targets ~/.pexo/config (the documented configuration path). Environment variable access reads user-provided PEXO_API_KEY and PEXO_BASE_URL for authentication. No prompt injection, data exfiltration, or malicious intent was detected. The only risk is plaintext storage of API credentials in a local config file, which is standard practice for this type of tool.

13
Files scanned
2,110
Lines analyzed
7
findings
claude
Audited by
Low Risk Issues (3)
Plaintext API key storage
API credentials (PEXO_API_KEY) are stored in plaintext in ~/.pexo/config. This is standard for CLI tools but means anyone with filesystem access to the user's home directory could read the key.
Temporary file creation
Scripts create temporary files using mktemp for HTTP request/response handling. Temp files are cleaned up after each request, but a crash could leave sensitive data (API responses) on disk.
Direct file path from user input
The upload script accepts a file path directly from command arguments without path traversal validation. This is acceptable for a local CLI tool but should be documented.

Audit version 23

Safe

Apr 15, 2026, 08:43 AM

The static analyzer detected 534 patterns across 13 files (2110 lines) with a risk score of 100/100. After semantic evaluation, all findings are confirmed as FALSE POSITIVES. The skill is a legitimate CLI client for the Pexo AI video platform. Shell commands (curl, jq, mktemp, stat) are standard CLI tooling. Network requests target only the configured PEXO_BASE_URL (default: pexo.ai). File access is limited to the skill's own config directory (~/.pexo/config) and temp files. Environment variable access reads only documented PEXO_API_KEY and PEXO_BASE_URL. No prompt injection, credential exfiltration, data exfiltration, or malicious behavior was detected. The skill acts as a relay between the user and Pexo's backend API.

13
Files scanned
2,110
Lines analyzed
9
findings
claude
Audited by
Medium Risk Issues (2)
Shell scripts execute external commands extensively
The skill uses curl, jq, mktemp, stat, basename, sed, awk, and other shell utilities across 349 locations. These are standard CLI tools used for HTTP requests, JSON processing, and file operations. All arguments are either hardcoded or derived from user-provided inputs that are validated locally before use. This is expected behavior for a shell-based API client.
Shell scripts source configuration from hidden directory
Scripts source ~/.pexo/config which sets PEXO_BASE_URL and PEXO_API_KEY. This is the documented configuration mechanism. The config file path is configurable via PEXO_CONFIG environment variable. This is standard practice for CLI tool configuration.
Low Risk Issues (3)
Hardcoded URLs in documentation and scripts
Multiple files contain hardcoded references to https://pexo.ai and related endpoints. These are the service's own URLs, documented as the default PEXO_BASE_URL. The base URL is configurable, allowing users to override the default.
Temporary file creation in shell scripts
Scripts create temporary files using mktemp for HTTP response bodies, headers, and error output. Files are cleaned up after use with rm -f. This is standard practice for shell-based HTTP clients.
System information queries in diagnostic script
pexo-doctor.sh runs command -v and --version checks to verify curl, jq, and file are installed. This is standard environment validation for a CLI tool dependency checker.

Audit version 22

Medium Risk

Apr 14, 2026, 08:45 AM

This skill is an API client for the Pexo AI video platform. Static analysis detected 534 potential security patterns across 13 files, but the majority are false positives reflecting standard CLI tool behavior. The skill uses shell scripts to make authenticated HTTP requests, read local configuration, and manage temporary files. Detected patterns (external commands, network calls, filesystem access, environment variable reads) are all expected for an API client skill. Weak cryptographic algorithms (MD5/SHA1) are used for file checksums, which is low-risk in this context. No credential exfiltration, unauthorized network access, or malicious patterns were found after manual evaluation.

13
Files scanned
2,110
Lines analyzed
11
findings
claude
Audited by

High Risk Issues (2)

API Key Access from Local Configuration
The skill reads PEXO_API_KEY from a local config file (~/.pexo/config) and uses it in HTTP Authorization headers. This is expected behavior for an API client skill, but grants the skill access to the user's API credentials. If the skill were modified maliciously, it could exfiltrate the key.
Weak Cryptographic Algorithm Usage
Multiple scripts use MD5 or SHA1 for file checksums and hashing. These algorithms are cryptographically weak and should not be used for security-critical operations. In this context, they are used for file integrity checks and deduplication, not security.
Medium Risk Issues (3)
External Shell Command Execution
The skill uses extensive shell command substitution ($(command)) and curl invocations to interact with the Pexo API. This is legitimate CLI tooling for an API client, but the pattern triggers static analysis due to the general risk of command injection if user input were passed unsafely to shell commands.
Network Access to External API
The skill makes HTTP requests to pexo.ai and related URLs. This is expected for an API client, but the network access could be misused if the skill were modified to send data to unauthorized endpoints.
Hidden File Access in Home Directory
The skill reads from ~/.pexo/config and writes to ~/.pexo/tmp. This is standard configuration and temporary file storage for a CLI tool, but access to hidden files in the home directory could be a vector for reading sensitive data if misused.
Low Risk Issues (2)
Hardcoded URLs in Documentation
The SKILL.md and reference files contain hardcoded URLs to pexo.ai documentation and API endpoints. These are legitimate service URLs, not malicious endpoints.
System Information Commands in Diagnostic Scripts
The doctor and troubleshooting scripts use commands like uname, df, and free to diagnose system configuration issues. These are legitimate diagnostic tools for a setup wizard.

Audit version 21

Medium Risk

Apr 13, 2026, 08:52 AM

This skill is a legitimate AI video production CLI tool that interacts with the Pexo API. The static analyzer flagged 534 patterns across 13 files, but most are false positives from standard shell scripting conventions. All network requests target the declared Pexo API endpoint (pexo.ai). Shell commands use safe argument construction via jq --arg (no injection vectors). The credential handling follows standard API key patterns. No malicious behavior, data exfiltration, or unauthorized access was found. Users should be aware the skill requires network access to an external API, stores API keys in a local config file, and executes shell scripts.

13
Files scanned
2,110
Lines analyzed
8
findings
claude
Audited by
Medium Risk Issues (3)
External API dependency with credential handling
The skill makes network requests to an external API (pexo.ai) using a bearer token API key. The API key is stored in a plaintext config file at ~/.pexo/config. This is a standard pattern but users should understand their credentials are transmitted to a third-party service.
Shell script execution with external process invocations
The skill contains 9 shell scripts that invoke external commands (curl, jq, file, stat, mktemp, date, sed, awk, tr). These are standard Unix utilities used for HTTP requests, JSON processing, and file handling. Arguments are constructed safely using jq --arg, preventing shell injection.
Configuration file stored in home directory
The skill reads and sources a configuration file at ~/.pexo/config which contains the API key and base URL. This is documented to the user. The file is sourced (not just read), which means it executes any content in the file. Users should ensure this file only contains the expected environment variable assignments.
Low Risk Issues (1)
Static analyzer flagged patterns are false positives
The static analyzer flagged 534 patterns including external_commands (349), network (27), filesystem (79), and env_access (25). All flagged patterns are standard shell scripting conventions: command substitution $(...), curl HTTP requests to declared endpoints, temp file creation with mktemp, and environment variable reads for configuration. No actual security vulnerabilities were confirmed.

Audit version 20

Low Risk

Apr 12, 2026, 08:30 AM

Static analysis flagged 534 patterns across 13 files, but evaluation confirms these are FALSE POSITIVES. The skill is a legitimate CLI tool for the Pexo AI video platform. Shell command substitution patterns are standard bash scripting for API calls to pexo.ai. Environment variable access (PEXO_API_KEY, PEXO_BASE_URL) is documented authentication. Filesystem access targets the skill's own config directory (~/.pexo/). Network calls go exclusively to the official Pexo API. No malicious patterns, credential exfiltration, or command injection vectors detected.

13
Files scanned
2,110
Lines analyzed
5
findings
claude
Audited by
Low Risk Issues (2)
API Key Required in Configuration
The skill requires PEXO_API_KEY to be stored in ~/.pexo/config file. This is documented and expected for API authentication, but users should ensure proper file permissions on the config file.
External API Dependencies
All functionality depends on external Pexo API endpoints (pexo.ai). Network calls use hardcoded URLs which is appropriate for a dedicated API client but means the skill cannot function offline.

Audit version 19

Low Risk

Apr 11, 2026, 08:20 AM

Static analyzer flagged 534 patterns across 13 files, but evaluation confirms these are FALSE POSITIVES. Shell command substitution patterns are standard bash scripting (date, stat, basename, jq). Network URLs point to official pexo.ai service. Hidden file access (~/.pexo/config) is standard configuration storage. Environment variable access (PEXO_API_KEY, PEXO_BASE_URL) is expected for API client tools. No malicious intent, credential exfiltration, or suspicious behavior detected. The skill is a legitimate video production agent.

13
Files scanned
2,110
Lines analyzed
6
findings
claude
Audited by
Low Risk Issues (2)
Configuration File in Home Directory
Skill reads configuration from ~/.pexo/config containing API key and base URL. This is standard practice for CLI tools but users should ensure config file has proper permissions (600).
API Key Required in Environment
Skill requires PEXO_API_KEY environment variable for authentication. Users must obtain API key from pexo.ai service. Key is transmitted to official API endpoints only.

Audit version 18

Safe

Apr 10, 2026, 08:45 AM

All 534 static analysis findings are FALSE POSITIVES. The skill is a legitimate CLI tool for AI video production. Shell command substitutions, config file access, and API key handling are standard patterns for bash-based CLI tools. Network requests go only to the legitimate pexo.ai service. No malicious patterns, credential exfiltration, or code injection vulnerabilities detected.

13
Files scanned
2,110
Lines analyzed
4
findings
claude
Audited by
No security issues found

Audit version 17

Low Risk

Apr 9, 2026, 08:41 AM

Static analyzer flagged 534 patterns but most are FALSE POSITIVES. Shell command substitution $(...) is standard bash syntax, not Ruby backticks. Network calls target legitimate pexo.ai API. Config storage at ~/.pexo/ is standard practice. One weak crypto finding (MD5 for non-security IDs) and standard API key handling warrant low risk classification. No malicious intent detected.

13
Files scanned
2,110
Lines analyzed
10
findings
claude
Audited by

High Risk Issues (1)

Weak Cryptographic Algorithm (Non-Security Use)
MD5 hashing used in scripts for generating request identifiers. While MD5 is cryptographically broken, it is only used for non-security purposes (request IDs, temp file names) not for authentication or data integrity.
Medium Risk Issues (2)
API Key Storage in Plaintext Config File
PEXO_API_KEY stored in ~/.pexo/config as plaintext. This is standard practice for CLI tools but represents a local security boundary - any process with user access can read the key.
Shell Command Execution via curl
Scripts execute curl commands with dynamic URLs constructed from config. While URLs are from trusted config, any compromise of ~/.pexo/config could lead to SSRF or credential exfiltration.
Low Risk Issues (3)
Static Analyzer False Positives - Command Substitution
Static analyzer flagged 349 instances of 'Ruby/shell backtick execution' but these are bash command substitutions $(...) which are standard and safe in shell scripts. No user input is injected into commands.
Static Analyzer False Positive - SAM Database
Critical finding claimed 'Windows SAM database' at SKILL.md:43. Line 43 actually contains 'LANGUAGE RULE' documentation text. This is a complete false positive from pattern matching.
Temporary File Creation
Scripts create temporary files using mktemp for HTTP response handling. Files are properly cleaned up after use. Low risk as mktemp creates secure random filenames.

Audit version 16

Low Risk

Apr 8, 2026, 08:35 AM

Static analysis detected 534 patterns across 13 files. Most findings are FALSE POSITIVES: shell command substitution patterns are standard bash scripting, hidden file access targets ~/.pexo/config for credential storage (documented requirement), and network URLs point to the legitimate pexo.ai service. The skill is a transparent API client with no evidence of malicious behavior, data exfiltration, or hidden functionality. Risk is elevated to 'low' (not 'safe') due to shell script execution requiring user trust.

13
Files scanned
2,110
Lines analyzed
8
findings
claude
Audited by
Low Risk Issues (4)
Shell Script Execution Pattern
Multiple bash scripts use command substitution and source external configuration files. This is standard CLI tooling but requires user trust in script contents.
Configuration File Access
Scripts read credentials from ~/.pexo/config file. This is documented and expected for API client tools, but represents credential access.
API Key Environment Variable Access
Scripts require PEXO_API_KEY and PEXO_BASE_URL environment variables. These are declared requirements in the skill metadata.
External API Communication
Scripts make HTTP requests to pexo.ai domain. URLs are hardcoded and point to the legitimate service provider.

Audit version 15

Low Risk

Apr 6, 2026, 08:41 AM

Static analysis flagged 534 patterns across 13 files with risk score 100/100. After semantic evaluation, all findings are FALSE POSITIVES representing legitimate shell automation patterns. The skill is an API client for Pexo video service using standard bash scripting. Shell command substitution, network requests to pexo.ai, config file access (~/.pexo/config), and environment variable usage (PEXO_API_KEY) are all expected behaviors for this type of tool. No malicious patterns, credential exfiltration, or prompt injection detected.

13
Files scanned
2,110
Lines analyzed
8
findings
claude
Audited by
Low Risk Issues (4)
Shell Command Substitution in Automation Scripts
Multiple shell scripts use command substitution $(...) and temp file creation with mktemp. This is standard bash automation pattern, not a vulnerability. All command arguments are hardcoded or derived from validated function parameters, not user input.
Network Requests to External API
Scripts make HTTPS requests to pexo.ai API endpoints. This is expected behavior for an API client skill. URLs are hardcoded to legitimate Pexo service endpoints, not user-controlled.
Environment Variable Credential Access
Skill reads PEXO_API_KEY and PEXO_BASE_URL from ~/.pexo/config file or environment. This is standard credential management for API clients. Credentials are used only for authenticating to Pexo API.
Configuration File in Home Directory
Skill uses ~/.pexo/config for storing API credentials and base URL. This follows conventional Unix configuration file patterns. File is read-only accessed, not modified by scripts.

Audit version 14

Low Risk

Apr 5, 2026, 08:19 AM

Static scanner flagged 534 patterns but all are false positives. The skill is a legitimate video production API client. Shell command substitution is standard bash scripting for curl/jq operations. Network calls go only to pexo.ai (the service's own API). Config file access and environment variables are expected for API authentication. No malicious intent, data exfiltration, or dangerous patterns detected.

13
Files scanned
2,110
Lines analyzed
9
findings
claude
Audited by
Low Risk Issues (5)
Static Scanner False Positives - External Commands
Static scanner flagged 349 shell command substitution patterns. All are legitimate bash scripting: curl for API calls, jq for JSON parsing, date for timestamps, mkdir/cat/printf for file operations. No user input injection vectors exist.
Static Scanner False Positives - Network URLs
Static scanner flagged 27 hardcoded URLs. All point to pexo.ai domain - the service's own API endpoint. No connections to external or suspicious domains detected.
Static Scanner False Positives - Cryptographic Algorithm
Static scanner flagged 'weak cryptographic algorithm' in multiple files. No actual cryptographic operations exist in the codebase. The pattern matcher likely triggered on API key format validation or hash-like strings.
Static Scanner False Positives - Windows SAM Database
Static scanner flagged 'Windows SAM database' at SKILL.md:43. Line 43 actually contains language localization instruction: 'You MUST reply to the user in the SAME language they use.' This is a complete false positive - no Windows credential access.
Static Scanner False Positives - Obfuscation Detection
Static scanner flagged 'dangerous combination' heuristics for obfuscation. The code uses transparent shell patterns with clear variable names and standard scripting idioms. No base64 encoding, string concatenation obfuscation, or dynamic code generation detected.

Audit version 13

Low Risk

Apr 4, 2026, 08:20 AM

This skill is a legitimate AI video production integration tool. Static analysis flagged 534 patterns across 13 files, but most are false positives. The scripts use standard bash patterns (command substitution, config file access) for legitimate purposes: API integration with pexo.ai, file uploads, and project management. No malicious intent detected. The critical finding about 'Windows SAM database' is a false positive - the referenced line discusses language settings, not credential access. Risk factors are expected for an API client that reads configuration, makes network requests, and handles file uploads.

13
Files scanned
2,110
Lines analyzed
7
findings
claude
Audited by
Low Risk Issues (3)
External API Configuration Required
The skill requires users to configure API credentials in ~/.pexo/config file. This is standard for API clients but users must trust the skill author.
Network Requests to External Service
Scripts make HTTPS requests to pexo.ai API. All network traffic goes to a single external domain which is the intended service provider.
File Upload Capability
The pexo-upload.sh script uploads user files to external servers. Files are sent to pexo.ai infrastructure for video processing.

Audit version 12

Low Risk

Apr 3, 2026, 08:30 AM

Static analysis flagged 534 patterns across shell scripts and documentation files. All findings are FALSE POSITIVEs - legitimate DevOps patterns for API-driven video production. Shell command substitution is standard bash scripting for curl/jq operations. Environment variable access is for user-provided API keys stored in ~/.pexo/config. Network calls target only pexo.ai domain. No command injection, credential exfiltration, or malicious patterns detected.

13
Files scanned
2,110
Lines analyzed
7
findings
claude
Audited by
Low Risk Issues (3)
External command execution in shell scripts
Shell scripts use command substitution $(...) and backticks for curl/jq operations. This is standard bash scripting pattern, not a security vulnerability. All commands operate with hardcoded arguments - no user input injection vectors detected.
API key stored in config file
API key stored in ~/.pexo/config file. This is user-provided credential for the Pexo service. The skill does not exfiltrate credentials - only uses them to authenticate with pexo.ai.
Network requests to external API
Scripts make HTTPS requests to pexo.ai domain. This is the intended functionality - a video production API client. All endpoints are documented and expected.

Audit version 11

Low Risk

Apr 2, 2026, 08:30 AM

Static analysis flagged 492 patterns inherent to bash scripting. All findings evaluated as FALSE_POSITIVES. The skill is a legitimate CLI wrapper for the Pexo AI video API. Shell command substitution is standard bash syntax for capturing command output, not code injection. Network requests target the configured Pexo API endpoint (pexo.ai) for video generation. Config file storage (~/.pexo/config) follows CLI best practices for API credentials. The only risk factor is standard CLI tool behavior: local script execution, credential storage, and API communication.

11
Files scanned
1,910
Lines analyzed
7
findings
claude
Audited by
Medium Risk Issues (1)
Shell Script Execution Pattern
Multiple shell scripts use command substitution $(...) and backticks for capturing command output. While flagged by static analysis, this is standard bash scripting practice for a CLI tool wrapper.
Low Risk Issues (2)
API Credential Storage
The skill stores API credentials in ~/.pexo/config file. This is standard practice for CLI tools but should be documented for users.
External API Communication
All video generation requests are sent to pexo.ai API endpoints. Users should trust the Pexo service for their video content.

Audit version 10

Low Risk

Apr 1, 2026, 08:37 AM

Community skill for AI video production via Pexo API. Static analysis flagged 492 patterns (risk score 100) but most are false positives for legitimate shell scripting. Confirmed risks: requires PEXO_API_KEY environment variable, makes HTTPS requests to pexo.ai, uses shell scripts with command substitution for API orchestration. No malicious intent detected - all network calls go to documented Pexo endpoints, credential handling follows standard patterns, and file operations are limited to temp directories for API requests.

11
Files scanned
1,910
Lines analyzed
8
findings
claude
Audited by
Medium Risk Issues (1)
API Key in Environment Variable
Skill requires PEXO_API_KEY environment variable for authentication. This is standard practice for API integrations but users should ensure secure key management.
Low Risk Issues (4)
External HTTPS Requests
Makes authenticated HTTPS requests to pexo.ai API endpoints for video creation. All network traffic uses TLS encryption.
Shell Command Substitution
Uses $(...) syntax for variable assignment in shell scripts. Pattern detected by static analyzer but all commands are hardcoded utilities (curl, jq, stat, basename).
Temporary File Creation
Creates temporary files using mktemp for HTTP request/response handling. Files are deleted after use.
Config File in Home Directory
Reads configuration from ~/.pexo/config file containing API credentials. Standard pattern for CLI tools.

Audit version 9

Low Risk

Mar 31, 2026, 08:32 AM

Static analysis detected 492 potential issues across 11 files (1910 lines). After evaluation, all findings are false positives. The skill is a legitimate API client for Pexo video creation service. Shell command usage, network access, and credential handling are all expected functionality for an API client tool. MD5 usage is in documentation context only. No malicious intent, credential exfiltration, or unauthorized operations detected.

11
Files scanned
1,910
Lines analyzed
7
findings
claude
Audited by
Medium Risk Issues (1)
MD5 Usage in Documentation
Static scanner detected MD5 hash usage in reference documentation files. This is in the context of documentation examples only, not in executable code. Not a security vulnerability in this context.
Low Risk Issues (2)
Shell Command Substitution
Extensive use of shell command substitution $() across all bash scripts. This is standard bash syntax and expected behavior for shell scripts. All substitutions use hardcoded, validated arguments with no user input injection vectors.
Documentation Code Examples
Ruby/shell backtick patterns detected in SKILL.md documentation. These are markdown code examples showing usage, not executable code.

Audit version 8

Low Risk

Mar 30, 2026, 08:42 AM

This skill is a legitimate video creation tool. The static analyzer detected shell commands, network requests, and credential access, but these are expected behaviors for an API-integrated tool. The skill uses shell scripts to communicate with the Pexo API service for video generation. No malicious intent or prompt injection detected.

11
Files scanned
1,910
Lines analyzed
4
findings
claude
Audited by
No security issues found

Audit version 7

Low Risk

Mar 29, 2026, 08:19 AM

This skill is a legitimate AI video production API client. Static analyzer flagged 492 patterns across 11 files, but all are false positives. Shell command substitutions are standard scripting patterns for legitimate operations like timestamps and string processing. Network access targets the official pexo.ai API. Config file access (~/.pexo/config) stores user API credentials. Environment variables (PEXO_API_KEY, PEXO_BASE_URL) are required for API authentication. No malicious patterns, credential exfiltration, or code injection risks detected.

11
Files scanned
1,910
Lines analyzed
6
findings
claude
Audited by
Low Risk Issues (2)
API Key Storage in Config File
API credentials stored in ~/.pexo/config file. This is standard practice for CLI tools but requires user awareness about file permissions.
Network Requests to External API
Skill makes HTTPS requests to pexo.ai API for video production. This is expected functionality but represents network exposure.

Audit version 6

Low Risk

Mar 28, 2026, 08:19 AM

Static analysis flagged 492 potential issues, but evaluation determined all are false positives. The skill uses standard shell scripting patterns (command substitution, temp files) for legitimate CLI operations. Network access is limited to the Pexo API endpoint (https://pexo.ai). Environment variable access is for API authentication (PEXO_API_KEY) required for the service. No malicious behavior, data exfiltration, or harmful operations detected.

11
Files scanned
1,910
Lines analyzed
8
findings
claude
Audited by
Medium Risk Issues (1)
Shell Command Execution Patterns
Static analyzer flagged shell command substitution and backtick execution in scripts. These are standard shell scripting patterns (mktemp, command substitution) used by legitimate CLI tools. No user input is dynamically executed as commands.
Low Risk Issues (3)
Environment Variable Access for API Authentication
Scripts read PEXO_API_KEY from environment or config file. This is required for API authentication and is standard practice for CLI tools.
Network Access to Pexo API Endpoint
Hardcoded URLs reference the legitimate Pexo API endpoint (https://pexo.ai). Network access is required for video generation service.
Filesystem Access for Configuration
Access to ~/.pexo/config and ~/.pexo/tmp for configuration and temporary file storage. Standard CLI tool patterns.

Audit version 5

Low Risk

Mar 27, 2026, 08:24 AM

Legitimate video creation API client skill. All detected patterns are expected for an API wrapper: external commands execute curl/jq for HTTP requests, network access connects to pexo.ai API, filesystem access manages config in ~/.pexo/config and temp files, environment variables store API credentials. Shell scripts use command substitution but with hardcoded arguments - no user input injection vectors found. The 'weak cryptography' findings are MD5 usage in a troubleshooting diagnostic script, which is acceptable for non-security checksums. No malicious intent detected.

11
Files scanned
1,910
Lines analyzed
8
findings
claude
Audited by
Medium Risk Issues (1)
API Key Storage in Config File
The skill stores API keys in ~/.pexo/config file. This is a standard practice for CLI tools but users should be aware this file contains sensitive credentials and should be protected with appropriate file permissions.
Low Risk Issues (3)
MD5 Hash in Troubleshooting Script
The pexo-doctor.sh script uses MD5 for file verification. MD5 is cryptographically weak but acceptable for non-security diagnostic checksums to detect file corruption.
Shell Command Substitution
Scripts use command substitution ($()) extensively to execute curl, jq, and other utilities. All reviewed instances use hardcoded or internally-controlled variables with no user input injection vectors.
Temporary File Creation
Scripts create temporary files in ~/.pexo/tmp for storing HTTP headers and responses. This is standard practice for HTTP operations and files are cleaned up appropriately.

Audit version 4

Medium Risk

Mar 26, 2026, 08:26 AM

Legitimate API client skill for Pexo AI video service. Static analyzer flagged 492 pattern matches across 11 files, but all findings are FALSE POSITIVE - expected patterns in bash-based CLI tools. The skill requires API credentials (PEXO_API_KEY), makes network calls to pexo.ai, uses shell scripts for automation, and stores config in ~/.pexo/config. These are documented, expected behaviors for an API integration skill. No malicious patterns, command injection, credential exfiltration, or data leakage detected.

11
Files scanned
1,910
Lines analyzed
9
findings
claude
Audited by
Medium Risk Issues (2)
Shell Script Execution Pattern
Skill uses bash scripts with command substitution ($(command)) for API calls and file operations. This is expected behavior for CLI tools but requires user trust in script contents.
API Credential Storage
Skill requires PEXO_API_KEY stored in ~/.pexo/config file. Credentials are read at runtime for API authentication.
Low Risk Issues (3)
Network Communication to External Service
Skill makes HTTPS requests to https://pexo.ai API endpoints. All traffic is encrypted via TLS.
Configuration File in Home Directory
Skill stores configuration in ~/.pexo/config following standard CLI convention (similar to ~/.gitconfig, ~/.aws/config).
Temporary File Creation
Scripts create temporary files in /tmp for HTTP request/response handling using mktemp.

Audit version 3

Low Risk

Mar 25, 2026, 08:30 AM

Static analysis flagged 492 patterns across 11 files (1910 lines), but all findings are FALSE POSITIVES for a legitimate API client skill. External commands are standard bash patterns with hardcoded/validated arguments. Network calls go to documented pexo.ai endpoints. Filesystem access uses standard config locations (~/.pexo/config) with proper temp file cleanup. Environment variable access (PEXO_API_KEY, PEXO_BASE_URL) is expected for API authentication. No prompt injection, credential exfiltration, or command injection vulnerabilities detected.

11
Files scanned
1,910
Lines analyzed
7
findings
claude
Audited by
Low Risk Issues (3)
API Key Storage in Local Config
API credentials stored in ~/.pexo/config file. This is standard practice for CLI tools but users should ensure proper file permissions.
External API Dependency
Skill requires network connectivity to pexo.ai servers. Production depends on external service availability.
Shell Script Execution
Skill consists of bash scripts that execute system commands. All command arguments are hardcoded or properly validated before use.

Audit version 2

Low Risk

Mar 24, 2026, 08:23 AM

Legitimate video production tool for Pexo.ai service. Static scanner detected 492 patterns, but evaluation confirms all are false positives or expected behavior for an API-based video generation tool. External commands are shell script operations, environment access is for API authentication (PEXO_API_KEY, PEXO_BASE_URL), filesystem access is for config and temp files, and network requests go only to official pexo.ai endpoints. No malicious intent, data exfiltration, or suspicious patterns found.

11
Files scanned
1,910
Lines analyzed
8
findings
claude
Audited by
Medium Risk Issues (1)
Requires API Credentials
Skill requires PEXO_API_KEY and PEXO_BASE_URL environment variables to function. These are standard API authentication credentials for the Pexo.ai service and are required for legitimate video production operations.
Low Risk Issues (3)
Filesystem Access for Configuration
Skill reads ~/.pexo/config file for API credentials. This is expected behavior for CLI tools requiring persistent configuration.
Temporary File Creation
Shell scripts create temporary files for HTTP request handling. This is standard practice for curl-based API clients.
External Service Dependency
All network requests go to pexo.ai domain. Users must trust this external service for video generation.

Audit version 1

Low Risk

Mar 23, 2026, 08:28 AM

This is a legitimate AI video generation CLI tool. All 492 static findings are legitimate tooling patterns: shell commands for CLI operations, network access to pexo.ai API only, filesystem access for config storage, and API key access for authentication. The skill implements proper security practices including API key masking in diagnostics and temporary file isolation via mktemp.

11
Files scanned
1,910
Lines analyzed
9
findings
claude
Audited by
Medium Risk Issues (3)
Shell Command Execution Patterns
Shell command substitution and backtick patterns detected across 316 locations in scripts and documentation. These are legitimate CLI tooling patterns for invoking pexo-chat.sh, pexo-project-create.sh, and other scripts. No user input injection vectors identified.
Network Access to External API
Network requests to external URLs detected. All network activity is confined to pexo.ai API endpoints only, verified by code inspection of _common.sh curl calls.
Environment Variable Access for Configuration
Access to PEXO_API_KEY and PEXO_BASE_URL environment variables. These are required for API authentication. The pexo-doctor.sh script implements proper API key masking via the mask_secret function.
Low Risk Issues (2)
Filesystem Access for Configuration Storage
Access to ~/.pexo/config for configuration and ~/.pexo/tmp for temporary files. Standard CLI tool practice using mktemp for secure temp file creation.
Documentation References to Shell Commands
Documentation files contain shell command examples for troubleshooting. These are instructional references, not executable code.

Detected Patterns

Heuristic: Code Execution + Network + Credential Access Combination