assemblyai-transcribe
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
uv runto execute the local Python scriptscripts/transcribe.py, which manages the transcription and speaker diarization process. - [EXTERNAL_DOWNLOADS]: The script declares a dependency on the
httpxlibrary and communicates withapi.assemblyai.com, which is a well-known service domain for AssemblyAI. - [DATA_EXFILTRATION]: Audio files and URLs are uploaded to AssemblyAI's servers for processing. This behavior is documented and essential to the skill's primary functionality.
- [PROMPT_INJECTION]: The skill processes transcription output derived from audio content, which constitutes a surface for indirect prompt injection.
- Ingestion points:
scripts/transcribe.pyaccepts audio from local file paths or external URLs. - Boundary markers: No specific delimiters or safety warnings are included in the formatted output transcripts.
- Capability inventory: The script has file-system write capabilities via the
--outputcommand-line argument. - Sanitization: No sanitization is performed on the text content retrieved from the transcription service.
Audit Metadata