ai-voice-cloning
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Remote Code Execution (CRITICAL): The command
curl -fsSL https://cli.inference.sh | shdownloads and executes a script from an untrusted domain directly in the shell. This pattern is highly susceptible to supply chain attacks. - Remote Code Execution (MEDIUM): The instructions use
npx skills add inferencesh/skills@..., which downloads and executes code from an unverified NPM organization. - Command Execution (MEDIUM): The skill requires the
Bashtool for runninginfshcommands, creating a potential vector for command injection. - External Downloads (HIGH): Software is downloaded from the
inference.shdomain, which is not on the list of trusted providers. - Indirect Prompt Injection (LOW): The skill processes external text input for voice synthesis without proper sanitization.
- Ingestion points: The
textfield in JSON inputs forinfsh app runin SKILL.md. - Boundary markers: None.
- Capability inventory:
Bashtool for CLI execution. - Sanitization: No escaping or validation is specified.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata