voice-clone
Fail
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: A hardcoded API key was identified in the sample code provided within the documentation.
- Evidence: In
SKILL.md, theWAVESPEED_KEYvariable is assigned a default hardcoded string value:b9c67f3def268385bb9734970b11531f12ea24ae0d153859242e48ae46227668. - [DATA_EXFILTRATION]: The skill accesses local audio files and uploads their content to a remote server for processing.
- Evidence: The
clone_voicefunction invoice_clone.pyreads a file from a local path, encodes it into Base64, and sends it tohttps://api.wavespeed.ai/api/v3/minimax/voice-clonevia a POST request. - [EXTERNAL_DOWNLOADS]: The skill retrieves generated audio files from external URLs provided by the API service.
- Evidence: The
download_audiofunction invoice_clone.pyuses therequestslibrary to fetch and save binary content from anaudio_urlprovided by the API predictions result.
Recommendations
- AI detected serious security threats
Audit Metadata