live-transcript-summary
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill frequently executes shell commands using the
wpsnote-clitool andpython3for core operations such as retrieving transcripts, searching notes, and editing document blocks. These operations are essential for the skill's stated purpose and utilize robust methods like--json-argsto prevent command injection. - [INDIRECT_PROMPT_INJECTION]: The skill processes live audio transcripts and historical note content, which are untrusted data sources that could potentially contain adversarial instructions.
- Ingestion points: Transcripts are retrieved via
wpsnote-cli audio, and historical content is accessed throughwpsnote-cli findandwpsnote-cli searchcommands. - Boundary markers: The prompt templates in
SKILL.mduse basic structural headers like[场景: {scene}]and[人物背景...]to isolate external data, though they do not include explicit instructions to ignore embedded commands. - Capability inventory: The skill has extensive write access to the WPS Note application via
edit_blockandbatch_edittools, allowing it to modify note content based on processed inputs. - Sanitization: No specific filtering or sanitization logic is applied to the raw transcript text before it is presented to the language model for summarization.
Audit Metadata