alicloud-ai-audio-tts

Warn

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: MEDIUMCREDENTIALS_UNSAFEDATA_EXFILTRATION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The script 'scripts/generate_tts.py' is designed to read the 'DASHSCOPE_API_KEY' from sensitive local paths including '~/.alibabacloud/credentials' and '.env' files. While this is the standard authentication method for Alibaba Cloud services, it involves programmatic access to local secrets.
  • [DATA_EXFILTRATION]: The 'call_generate' function in 'scripts/generate_tts.py' allows the 'base_url' to be configured dynamically from the input request object. This creates a vulnerability where a malicious prompt could redirect the agent to send the user's API key to an untrusted external server. Furthermore, the 'download_audio' function uses 'urllib.request.urlopen' to download files from the URL returned by the API, which could be exploited for Server-Side Request Forgery (SSRF) if the API response is manipulated.
  • [EXTERNAL_DOWNLOADS]: The skill installs the 'dashscope' library and connects to 'aliyuncs.com' domains. These are recognized as well-known and official resources for Alibaba Cloud services and are considered safe under intended use.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 10, 2026, 04:01 PM