speak
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/speak.tsexecutes system utilities includingedge-tts,say, andafplay. The code usesBun.spawnwith argument arrays, which is a secure implementation that mitigates shell injection risks by avoiding direct shell execution of user-supplied strings. - [EXTERNAL_DOWNLOADS]: The skill relies on the
edge-ttsPython package. This is a well-known and standard tool for accessing Microsoft's neural text-to-speech services and is considered a safe dependency. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface because it ingests and processes text from the agent that may originate from untrusted external sources. \n
- Ingestion points: The
textvariable inscripts/speak.tspopulated via command-line arguments. \n - Boundary markers: None. \n
- Capability inventory: The script spawns subprocesses for speech synthesis and audio playback via
Bun.spawn. \n - Sanitization: No validation or escaping is performed on the input text before it is passed to the TTS engines.
Audit Metadata