slack-voice-interface
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local Python scripts through the $MCP_CALL and $TTS_MCP_SCRIPT environment variables to perform text-to-speech tasks.
- [PROMPT_INJECTION]: The skill processes untrusted transcribed voice data from Slack users, presenting an indirect prompt injection surface. Ingestion points: Slack voice transcripts from external users. Boundary markers: No explicit delimiters are used to isolate the user's transcript from the agent's instructions. Capability inventory: Execution of local system commands via Python scripts. Sanitization: There is no evidence of sanitization or filtering applied to the transcript before it is processed by the agent.
Audit Metadata