voice-clone
Warn
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The
cmdSourcefunction inscripts/voice-clone.tsallows users to specify local file paths via the--filesargument. The script resolves these paths and copies the files to an output directory usingreadFileSyncandwriteFileSyncwithout validating the file type or restricting access to specific directories. This creates a significant data exposure surface where an agent could be manipulated into reading sensitive system files (e.g.,.sshkeys or.envfiles) and exposing them in the skill's output folder. - [COMMAND_EXECUTION]: The skill executes external binaries such as
ffmpegandyt-dlpusingBun.spawn. While arguments are passed as an array (reducing direct shell injection risks), the command parameters are constructed from user-provided inputs like directory paths and durations, which could be abused if specially crafted strings are passed to these underlying tools. - [EXTERNAL_DOWNLOADS]: The
sourcecommand can download audio files from arbitrary URLs provided via the--urlargument. This functionality can be used to fetch content from untrusted remote servers and could potentially be leveraged for Server-Side Request Forgery (SSRF) attacks if the agent is tricked into accessing internal network resources. - [CREDENTIALS_UNSAFE]: The skill requires a sensitive
ELEVENLABS_API_KEYto function. The script retrieves this credential from environment variables and transmits it in headers to the ElevenLabs API. While this is a standard pattern for such integrations, it represents a credential handling risk if the environment or the script execution is compromised. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its ingestion of untrusted external data.
- Ingestion points: URLs and local file paths provided to the
sourcecommand inscripts/voice-clone.ts. - Boundary markers: None. There are no delimiters or instructions to ignore embedded commands in the processed data.
- Capability inventory:
Bun.spawn(executing ffmpeg/yt-dlp),fetch(network requests to arbitrary URLs and ElevenLabs API), and file system read/write operations. - Sanitization: None. The script does not sanitize or validate input paths or URLs before processing them.
Audit Metadata