phone-agent
Audited by Socket on Mar 4, 2026
2 alerts found:
SecurityObfuscated FileThis skill's design and documented workflow are coherent with its stated purpose (bridging Twilio calls to STT/LLM/TTS). There is no explicit malicious code in the provided documentation fragment. However, there are legitimate supply-chain and operational risks: it requires multiple high-value API keys, exposes a local server to the internet (ngrok), and forwards potentially sensitive audio/transcripts to third-party services. Those properties increase the risk of credential exposure and data exfiltration if the host, tunnel, or credentials are compromised. Security mitigations should include: using scoped/rotating credentials, restricting access to the exposed endpoint, enabling strict logging and redaction of transcripts, and auditing how system prompt files are selected. Overall I assess moderate security risk but no direct evidence of malware.
The code fragment appears to implement a legitimate Twilio <-> OpenAI realtime audio bridge but is buggy and incomplete. Key issues: system prompt contains accidental pasted runtime code (risk of leaking implementation into model prompts), logger used before initialization (runtime error), and missing helper objects/functions (fragment truncated). No strong evidence of deliberate malicious code was found, but the module intentionally forwards user audio and transcripts to external services (OpenAI/Twilio), which is a meaningful privacy/data-exfiltration risk that must be considered in threat models. Do not deploy this fragment as-is; fix the prompt/text corruption, correct logger initialization order, ensure secrets are managed securely, and review logging/transcript retention and consent.