voice-call
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through its message parameters.
- Ingestion points: Input is accepted via the
--messageand--ssmlcommand-line arguments inscripts/voice_call.py. - Boundary markers: No delimiters are used to isolate user-provided content from the surrounding telephony logic.
- Capability inventory: The skill makes network requests to external APIs to initiate phone calls.
- Sanitization: The script performs no escaping or validation of input strings, which allows an attacker to potentially inject control tags (like TwiML) to manipulate call flow.
- [DATA_EXFILTRATION]: The skill transmits API credentials and call data to official telephony service providers. These operations are conducted using established service domains and follow standard practices for cloud-based communication tools.
- [EXTERNAL_DOWNLOADS]: The skill utilizes the
twilioPython library to interact with external communication services.
Audit Metadata