chanjing-tts-voice-clone
Pass
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: SAFECREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill manages sensitive API credentials, including
app_id,secret_key, andaccess_token, by reading from and writing to a local configuration file at~/.chanjing/credentials.json. This is standard practice for the vendor's credential management. - [COMMAND_EXECUTION]: The
_auth.pyscript invokessubprocess.runto execute a local script from a sibling directory (chanjing-credentials-guard/scripts/open_login_page). This is used as an automated fallback to open a login page if credentials are missing. - [EXTERNAL_DOWNLOADS]: The skill makes several network requests using
urllib.requesttohttps://open-api.chanjing.cc. These requests are used to obtain access tokens, upload reference audio for voice cloning, and poll for the status of speech synthesis tasks. - [PROMPT_INJECTION]: The skill identifies an attack surface for indirect prompt injection by processing user-supplied text and URLs for TTS processing.
- Ingestion points: User-provided
textandurlinputs increate_taskandcreate_voicescripts. - Boundary markers: None identified; input is interpolated directly into JSON request bodies.
- Capability inventory: File system access (read/write credentials), subprocess execution (
_auth.py), and network operations across all primary scripts. - Sanitization: The
create_taskscript enforces a maximum length of 4000 characters for the input text.
Audit Metadata