alicloud-ai-audio-tts
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script 'scripts/generate_tts.py' is designed to read the 'DASHSCOPE_API_KEY' from sensitive local paths including '~/.alibabacloud/credentials' and '.env' files. While this is the standard authentication method for Alibaba Cloud services, it involves programmatic access to local secrets.
- [DATA_EXFILTRATION]: The 'call_generate' function in 'scripts/generate_tts.py' allows the 'base_url' to be configured dynamically from the input request object. This creates a vulnerability where a malicious prompt could redirect the agent to send the user's API key to an untrusted external server. Furthermore, the 'download_audio' function uses 'urllib.request.urlopen' to download files from the URL returned by the API, which could be exploited for Server-Side Request Forgery (SSRF) if the API response is manipulated.
- [EXTERNAL_DOWNLOADS]: The skill installs the 'dashscope' library and connects to 'aliyuncs.com' domains. These are recognized as well-known and official resources for Alibaba Cloud services and are considered safe under intended use.
Audit Metadata