transcript-fixer
Fail
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The helper script
scripts/fix_transcript_enhanced.pyreads sensitive system configuration files (~/.zshrc,~/.bashrc,~/.bash_profile,~/.profile) to automatically locate and extract API keys. These files frequently contain credentials and environment variables, and accessing them constitutes exposure of sensitive system data. - [COMMAND_EXECUTION]: Multiple components, such as
scripts/ensure_deps.pyandscripts/fix_transcript_enhanced.py, use thesubprocessmodule to execute theuvpackage manager and call other internal scripts within the skill folder. - [REMOTE_CODE_EXECUTION]: The
scripts/ensure_deps.pyscript provides instructions for the user to download and execute an installation script fromastral.sh(the official domain for theuvtool) via a piped shell command (curl | sh). This is a documented installation method for a well-known developer tool. - [PROMPT_INJECTION]: The skill processes transcript files, which are considered untrusted external data, and interpolates them into LLM prompts via
scripts/core/ai_processor.py. While the prompts include boundary markers and instructions to follow a specific format, there is an inherent risk of indirect prompt injection where malicious content in a transcript could attempt to override the agent's behavior during the correction process. - Ingestion points: Transcripts are read from the file system in
scripts/cli/commands.pyvia the--inputargument. - Boundary markers: The prompt in
scripts/core/ai_processor.pyuses headers like**需要修复的内容**:to delineate untrusted content. - Capability inventory: The skill can perform network operations (API calls) and file system writes.
- Sanitization: No specific sanitization or escaping is applied to the transcript content before LLM interpolation.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
Audit Metadata