ad-creative
Fail
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructs the user to download code from an untrusted third-party GitHub repository.
- Evidence:
references/generative-tools.mdprovides instructions to rungit clone https://github.com/jamiepine/voicebox.git. - [REMOTE_CODE_EXECUTION]: The skill suggests building and executing the previously downloaded untrusted code on the local machine.
- Evidence:
references/generative-tools.mdspecifies commandsmake setupandmake devto be run within the cloned Voicebox repository. - [COMMAND_EXECUTION]: The skill utilizes several system commands and local scripts for data management and media generation.
- Evidence:
SKILL.mdreferences the execution ofnode tools/clis/google-ads.jsfor fetching performance data. - Evidence:
references/generative-tools.mdmentions usingnpx create-video@latest,npx remotion render, andffmpegfor video production. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted data from ad performance reports and external outputs.
- Ingestion points: The skill ingests ad copy and campaign performance data via CSV files, manual pastes, or API outputs as described in
SKILL.md. - Boundary markers: Absent; the instruction set does not include delimiters or warnings to ignore instructions embedded within the ingested data.
- Capability inventory: The skill has the ability to execute local scripts (node), perform network operations (curl), and run media rendering tools (remotion, ffmpeg).
- Sanitization: Absent; no validation or filtering of the processed data is mentioned.
- [EXTERNAL_DOWNLOADS]: The skill fetches data and performs operations using well-known services for AI generation.
- Evidence:
references/generative-tools.mdincludescurlcommands targeting Google's Gemini API and the ElevenLabs API, which are well-known technology providers.
Recommendations
- AI detected serious security threats
Audit Metadata