byted-podcast-gen
Warn
Audited by Snyk on Mar 26, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). This skill accepts arbitrary public webpage or file URLs as required input (see SKILL.md "网页模式" and examples) and passes the input_url through scripts/podcast.py into the remote PodcastTTS websocket endpoint (ENDPOINT in scripts/podcast.py), meaning untrusted third‑party page/file content can be fetched/ingested and influence generated audio and session behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill sends a user-supplied --input_url (example shown: https://www.volcengine.com/docs/6561/1668014?lang=zh) to the runtime WebSocket endpoint wss://openspeech.bytedance.com/api/v3/sami/podcasttts so the service will fetch that external URL's content and inject it into the generation context (i.e., it uses remote content at runtime to control the produced prompts/output).
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata