audio-quality-check
Pass
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. The script
scripts/analyze_recording.pyparses ametadata.jsonfile located in the user-provided directory and outputs fields liketitle,appName, andspeakersdirectly into the agent's context. An attacker could craft a directory containing a maliciousmetadata.jsonwith instructions intended to hijack the agent's session. - Ingestion points:
scripts/analyze_recording.py(readingmetadata.jsonviajson.loads). - Boundary markers: None present; data is interpolated directly into the printed report.
- Capability inventory:
scripts/analyze_recording.pyperforms file reading, temporary directory management (tempfile,shutil.rmtree), and executes external processes viasubprocess.run. - Sanitization: No sanitization or escaping is performed on the metadata values before they are printed.
- [COMMAND_EXECUTION]: The analysis script
scripts/analyze_recording.pyuses thesubprocessmodule to callffmpegandffprobe. It dynamically constructs the arguments based on the directory path provided by the user and the files discovered within that directory. Although it uses list-based arguments which mitigate shell injection, it remains a point of interaction with the system's execution environment. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of multiple external Python dependencies (
numpy,soundfile,scipy,pyloudnorm,pesq,pystoi,librosa) and system-level tools (ffmpeg,ffprobe). These are well-known and standard libraries for signal processing and audio analysis, but they represent a broad external dependency surface.
Audit Metadata