speak-sdk-patterns
Warn
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The TypeScript code snippet for the
preprocessAudiofunction inSKILL.mduses theexecSyncfunction to run anffmpegshell command. TheinputPathvariable is interpolated directly into the command string using template literals (e.g.,ffmpeg -y -i "${inputPath}" ...). Because the input is not sanitized or escaped, this pattern is vulnerable to command injection if an attacker can control the filename of the audio file being processed. A malicious filename such asfile.wav"; touch /tmp/pwned; "could result in arbitrary command execution on the host system. By contrast, the Python implementation inreferences/code-patterns.mduses the safersubprocess.runmethod with a list of arguments, which is not vulnerable to this type of shell injection.
Audit Metadata