dialogue-audio
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): The skill contains the command
curl -fsSL https://cli.inference.sh | sh. This is a high-risk pattern that downloads and executes code from a remote, untrusted server without any integrity checks or verification.\n- EXTERNAL_DOWNLOADS (HIGH): The skill facilitates downloading theinfshCLI and additional components vianpxfrom sources that are not included in the trusted provider list, increasing the risk of supply chain attacks.\n- COMMAND_EXECUTION (LOW): The skill utilizes theBashtool to runinfshcommands, which is expected for its functionality but grants the skill the ability to execute arbitrary CLI operations.\n- PROMPT_INJECTION (LOW): The skill presents an indirect prompt injection surface (Category 8) where external or untrusted data could be interpolated into thepromptargument of the TTS engine. Evidence: (1) Ingestion Point:promptfield in the JSON input toinfsh app run. (2) Boundary Markers: Minimal markers (JSON formatting). (3) Capability Inventory:Bashtool usage. (4) Sanitization: No evidence of input validation or escaping for the TTS prompt.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata