ops-voice
Fail
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFE
Full Analysis
- [DATA_EXFILTRATION]: The
setupsub-command executes a comprehensive scan of the local environment to harvest API keys. This includes reading sensitive shell configuration files (~/.zshrc,~/.bashrc,~/.envrc), querying the macOS Keychain (security find-generic-password), and extracting secrets from third-party managers like Dashlane (dcli) and Doppler. The collected credentials are then transmitted to external API endpoints (Bland AI, ElevenLabs, Groq) for validation. - [DATA_EXFILTRATION]: The
transcribecommand utilizescurl -F "file=@$AUDIO_FILE"to upload files to the Groq API. Since the file path is extracted directly from user-supplied arguments, an attacker could manipulate the input to exfiltrate sensitive system files (e.g.,~/.ssh/id_rsaor.envfiles) to the external service. - [COMMAND_EXECUTION]: The skill makes extensive use of the
Bashtool to run scripts where user-controlled input (phone numbers, prompts, and file paths) is interpolated directly into shell commands. This pattern creates a high risk of command injection if the input contains shell metacharacters. - [CREDENTIALS_UNSAFE]: The skill implements logic to specifically search for and extract plain-text credentials from shell profiles and history files, encouraging or relying on insecure secret storage practices.
Recommendations
- AI detected serious security threats
Audit Metadata