giggle-voice-clone
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [SAFE]: The skill performs its primary function of voice cloning using the vendor's infrastructure. No malicious or suspicious patterns were found during the analysis.\n- [COMMAND_EXECUTION]: The skill executes a local script,
scripts/voice_clone_api.py, which coordinates interactions with the Giggle.pro API using the Pythonrequestslibrary.\n- [CREDENTIALS_UNSAFE]: The skill requires aGIGGLE_API_KEY. The implementation follows security best practices by instructing the agent to utilize system environment variables, preventing the exposure of the key in shell history or process listings.\n- [EXTERNAL_DOWNLOADS]: The skill makes network requests tohttps://giggle.proto submit audio samples and retrieve synthesized results. This communication is restricted to the official vendor domain and is required for the skill's operation.\n- [PROMPT_INJECTION]: The skill provides an attack surface for indirect prompt injection by accepting user-supplied text and audio URLs.\n - Ingestion points: User input for
audio_url,voice_id, andtextis passed to the execution script inSKILL.md.\n - Boundary markers: None present; the skill does not use delimiters to wrap untrusted user input in the script execution.\n
- Capability inventory: Access to network operations via the
requestslibrary and subprocess execution via theexectool.\n - Sanitization: Input is parsed by the Python
argparsemodule, which provides standard command-line argument handling and validation for basic types.
Audit Metadata