audio-quality-check
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/analyze_recording.pyexecutesffmpegandffprobeusingsubprocess.run(). These calls use list-based arguments withoutshell=True, which is a secure practice to prevent command injection. - [EXTERNAL_DOWNLOADS]: The
SKILL.mdfile provides instructions to install standard Python dependencies (numpy,soundfile,scipy,pyloudnorm,pesq,pystoi,librosa) and system utilities (ffmpeg,sox) from official registries and package managers. - [DATA_EXPOSURE]: The skill processes audio recordings from user-specified directories (e.g., Blackbox recording paths). It performs analysis locally and uses temporary directories for intermediate processing, with no evidence of data exfiltration or network operations.
- [INDIRECT_PROMPT_INJECTION]: The skill demonstrates a standard data processing surface by reading file paths and metadata from a user-provided directory.
- Ingestion points: Directory path input via command line;
metadata.jsonand audio files inscripts/analyze_recording.py. - Boundary markers: Not applicable to binary audio data.
- Capability inventory: Subprocess execution of media tools; file system read/write in temporary directories.
- Sanitization: Uses
pathlibfor file operations and list-basedsubprocesscalls, effectively sanitizing input against shell injection.
Audit Metadata