alicloud-ai-audio-cosyvoice-voice-clone
Pass
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: Indirect Prompt Injection surface.
- Ingestion points: The
voice_sample_urlparameter inSKILL.mdandscripts/prepare_cosyvoice_clone_request.pyaccepts external audio URLs. - Boundary markers: Absent.
- Capability inventory: The skill has local file-writing and script execution capabilities.
- Sanitization: Only basic character constraints for the
prefixfield are documented, but no strict validation is implemented in the script. - [DATA_EXFILTRATION]: Local file path manipulation. The script
scripts/prepare_cosyvoice_clone_request.pyperforms file read operations viaPath.read_text()for the--validate-responseargument and write operations for the--outputargument. This could be exploited to read sensitive local files or overwrite data if an agent is successfully manipulated into using unauthorized system paths.
Audit Metadata