podcastfy
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
generate_podcast.pyscript usessubprocess.runto create a virtual environment and execute installation commands. It also employsos.execvto re-execute itself within the local environment to ensure all dependencies are properly loaded. - [EXTERNAL_DOWNLOADS]: The skill automatically downloads and installs standard Python packages (
podcastfy,pyyaml,playwright,audioop-lts) from PyPI and installs the Chromium browser binary via Playwright to support URL content extraction. - [DATA_EXPOSURE]: The bootstrapping logic attempts to read the user's
~/.zshrcshell profile to automatically locate and synchronizeGEMINI_API_KEY,GOOGLE_API_KEY, andOPENAI_API_KEYenvironment variables. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it fetches and processes content from user-supplied URLs. • Ingestion points: External web content is ingested via the
--inputparameter inscripts/generate_podcast.py. • Boundary markers: There are no explicit delimiters or instructions to ignore embedded commands within the processed data. • Capability inventory: The skill maintains capabilities for shell command execution, file system modifications, and network access. • Sanitization: Content sanitization is managed by the underlyingpodcastfylibrary and is not explicitly handled in the bootstrapping script.
Audit Metadata