transcribe
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
transcribe.jsscript usesexecSyncwith a template literal that directly interpolates thefilePathvariable into a shell command forffprobe. This allows for arbitrary shell command execution if a filename contains metacharacters such as backticks or semicolons. Thetranscribe.shwrapper script is similarly vulnerable to command injection via its command-line argument used in acurlcall.\n- [DATA_EXFILTRATION]: The skill reads the contents of the file specified in thefilePathparameter and uploads it to the Groq or OpenAI APIs. An attacker could use this functionality to exfiltrate sensitive files from the host system by providing their paths as input to the transcription command.\n- [EXTERNAL_DOWNLOADS]: The skill makes network connections toapi.groq.comandapi.openai.com. These are recognized as well-known technology services and are used here for the skill's primary transcription functionality.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it transcribes untrusted audio content that could contain instructions designed to influence the agent's behavior. Ingestion points: File input intranscribe.jsandtranscribe.sh. Boundary markers: None. Capability inventory: System command execution viaexecSyncandspawn, and network access viahttps.request. Sanitization: No sanitization is performed on input file contents or transcribed text output.
Recommendations
- AI detected serious security threats
Audit Metadata