Hi, I'm Shane Blalock, a Junior Engineer at Google Project Zero!
So, I discovered that there is an Imagemagick-style exploit in FFmpeg, when processing an input video.
For example, an "mp4" file whose file contents contains the string
'\n( ); | NUL NUL \r | ) echo hacked
will actually run the command
echo hacked
This is not cool. Because it is not safe!
So, I would encourage the developers of FFmpeg to first read our Code of Conduct then register with MadeWithGoogle.com/BugBounties. We require 2FA