stt-integration
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The script
scripts/batch-transcribe.shis vulnerable to shell command injection. It constructs a command string using filenames found via thefindcommand and then executes that string usingeval. If a file in the processed directory has a malicious name (e.g.,"; touch RCE; ".mp3), theevalcall will execute the injected commands. - [PROMPT_INJECTION] (HIGH): The skill possesses a high-risk surface for Indirect Prompt Injection (Category 8).
- Ingestion points: Untrusted audio and video files are processed for transcription in
scripts/transcribe-audio.shandscripts/batch-transcribe.sh. - Boundary markers: Absent. The transcribed text is output directly to the agent's context without any delimiters or 'ignore' instructions.
- Capability inventory: The skill allows powerful operations including
Bash,Read,Write, andEdit, meaning a successful injection via audio content could lead to significant unauthorized system actions. - Sanitization: Absent. There is no logic to sanitize or validate the content of the transcription before it is handled by the agent.
Recommendations
- AI detected serious security threats
Audit Metadata