text-to-speech
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Unverifiable Dependencies & Remote Code Execution (MEDIUM): The skill instructs the agent to run code from an external npm package that is not on the trusted sources list. Execution via
npxdownloads and runs the package immediately. - Evidence: Usage of
npx -y superconductor-gemini-skillsin all provided examples inSKILL.md. - Risk: If the npm package is compromised or maliciously crafted, it could execute arbitrary code on the host system.
- Command Execution (LOW): The skill executes local shell scripts to interface with the Gemini API.
- Evidence:
bash ${CLAUDE_PLUGIN_ROOT}/scripts/gemini.sh. - Indirect Prompt Injection (LOW): The skill processes untrusted user-provided text for conversion to speech. While this primarily results in audio output, the surface for injection exists if the downstream agent uses the TTS results for further logic.
- Ingestion points:
TEXT TO SPEAKargument in shell and npx commands inSKILL.md. - Boundary markers: None present; the text is passed directly as a string.
- Capability inventory: File system write (WAV file generation), network access (Gemini API).
- Sanitization: None documented.
- Credentials (INFO): The skill requires the
GEMINI_API_KEYenvironment variable. This is a standard requirement for such services and is handled via environment variables rather than being hardcoded.
Audit Metadata