openai-whisper-api
Fail
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/transcribe.shscript is vulnerable to argument injection within thecurlcommand. The optional parameters for--languageand--promptare expanded using unquoted shell parameter expansion (e.g.,${language:+-F "language=${language}"}). This allows an attacker to inject additionalcurlflags by including spaces and quotes in the parameter values, which could be used to overwrite local files or exfiltrate data. - [PROMPT_INJECTION]: The skill processes external audio files and returns the resulting transcription, creating a surface for indirect prompt injection where malicious instructions in the audio could influence the agent.
- [PROMPT_INJECTION]: Mandatory evidence chain for indirect injection: (1) Ingestion points: The
scripts/transcribe.shscript accepts external audio files via the<audio-file>argument. (2) Boundary markers: No delimiters or protective instructions are used when passing the transcribed output back to the agent. (3) Capability inventory: The skill has filesystem write access and network access viacurl. (4) Sanitization: No validation, filtering, or sanitization is performed on the audio content or the resulting transcription text.
Recommendations
- AI detected serious security threats
Audit Metadata