speech-pathology-ai
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Indirect Prompt Injection (HIGH): The skill is highly vulnerable to indirect prompt injection because it pairs external data ingestion tools with powerful system-level capabilities.
- Ingestion points: External content is brought into the agent's context via
mcp__firecrawl__firecrawl_searchandWebFetch. - Boundary markers: Absent. The instructions do not define delimiters or provide warnings to the agent to ignore instructions embedded in the data it retrieves from the web.
- Capability inventory: The skill allows
Bash(python:*, pip:*),Write, andEdit. If an attacker-controlled website is processed via Firecrawl, it could inject instructions that the agent then executes via the Bash or file-writing tools. - Sanitization: Absent. No sanitization or validation logic is defined for data fetched from external URLs.
- Command Execution (HIGH): The skill's manifest grants broad
Bashaccess with wildcards forpythonandpip. This allows the agent to execute any Python script or install any package, which is a high-risk capability when combined with untrusted external input. - External Downloads (LOW): The skill requires the installation of several Python packages (
librosa,torch,transformers,praat-parselmouth). While these are reputable libraries for the stated purpose, thepip:*permission allows for the installation of unverified or malicious packages if the agent is compromised via injection.
Recommendations
- AI detected serious security threats
Audit Metadata