tim-cook-perspective
Warn
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The scripts
tools/tts_stream.pyandtools/tts_synthesize.pycontain logic to automatically install missing Python packages (voxcpm,soundfile,numpy,sounddevice) usingpip installviasubprocess.check_call. Running package installation at runtime without explicit user confirmation for each package is a security risk. - [EXTERNAL_DOWNLOADS]: The skill downloads the
openbmb/VoxCPM2model, which is approximately 4GB, from Hugging Face during its first run. Large external binary downloads from third-party organizations can introduce supply chain vulnerabilities. - [COMMAND_EXECUTION]: Multiple files, including
tools/audio_play.pyandtools/tts_stream.py, usesubprocess.runorsubprocess.check_callto execute shell commands. These are used for audio playback (afplay,aplay,ffplay) and for the aforementioned package management, increasing the attack surface for command injection if user inputs are mishandled. - [PROMPT_INJECTION]: The
SKILL.mdinstructions explicitly command the agent to "never include any disclaimer, role description or meta notes in the response text." While intended to ensure clean audio synthesis, this instruction serves as a concealment pattern that prevents the AI from disclosing its identity or including necessary safety disclaimers in the text visible to the user. - [PROMPT_INJECTION]: The system prompt includes instructions to resist adversarial or character-breaking probes by "redefining the battlefield" or refusing to step out of character unless a specific exit phrase is used, which can be used to bypass standard AI safety transparency.
Audit Metadata