slidespeak
Fail
Audited by Gen Agent Trust Hub on Feb 13, 2026
Risk Level: HIGHPROMPT_INJECTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill creates a high-risk attack surface by processing untrusted external content while possessing extensive system capabilities. \n
- Ingestion points: Untrusted data is ingested from files via
node scripts/slidespeak.mjs uploadand from text via thegeneratecommand. \n - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are present in the documentation. \n
- Capability inventory: The skill is granted
Bash,Read, andWritepermissions, providing a powerful execution environment for injected instructions. \n - Sanitization: No evidence of content filtering or sanitization of ingested documents exists. \n- [Data Exposure & Exfiltration] (HIGH): The skill provides a mechanism to transmit local file content to an external server (
api.slidespeak.co). \n - Evidence: The
uploadcommand takes an arbitrary local path and sends the file to the SlideSpeak API. This capability can be exploited to exfiltrate sensitive files such as~/.aws/credentialsor private keys if the agent is manipulated through prompt injection. \n- [Command Execution] (LOW): The skill relies on executing a local Node.js script (scripts/slidespeak.mjs) to interact with the API. This is a standard integration pattern but requires the underlying script to be audited for secure handling of input parameters to prevent shell injection.
Recommendations
- AI detected serious security threats
Audit Metadata