azure-speech-to-text-rest-py
Fail
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: HIGHDATA_EXFILTRATION
Full Analysis
- Indirect Prompt Injection / Data Exposure (HIGH): The Python functions
transcribe_with_pronunciation_assessmentandfull_pronunciation_assessmentaccept a file path (audio_file_path/audio_path) directly from input parameters without validation. - Ingestion points: File paths passed to the transcription functions in
references/pronunciation-assessment.md. - Boundary markers: Absent. There are no checks to ensure the path resides within a restricted directory or corresponds to a valid audio file.
- Capability inventory: The code uses
open(path, "rb")to read local files andrequests.post()to send the resulting binary data to a remote URL (stt.speech.microsoft.com). - Sanitization: Absent. No path normalization or extension filtering is performed.
- Evidence: If an agent is coerced into passing a sensitive path (e.g.,
~/.ssh/id_rsaor/etc/passwd) as the audio file argument, the skill will read that file and transmit its contents to the Azure Speech API endpoint. - Network Operations (LOW): The skill transmits data to a non-whitelisted domain (
stt.speech.microsoft.com). While this is a legitimate Azure service, within the context of the unvalidated file read, it provides an exfiltration channel for local data.
Recommendations
- AI detected serious security threats
Audit Metadata