Scan Report
5 /100
voice-interview-simulator
中文求职语音模拟面试器 — 使用 LLM 生成问题、ASR 转写回答、TTS 播报面试官语音,输出结构化评估报告
A legitimate Chinese voice interview simulator using LLM, ASR, and TTS APIs. No malicious behavior detected; all functionality is accurately documented and scoped.
Safe to install
This skill is safe to use. No security concerns require action.
Findings 1 items
| Severity | Finding | Location |
|---|---|---|
| Low | Loose dependency version pinning Supply Chain | requirements.txt:1 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | scripts/run_interview.py:359 writes to OUTPUT_DIR/ |
| Network | READ | READ | ✓ Aligned | scripts/run_interview.py:295-315 POSTs to ASR/TTS APIs; scripts/run_interview.py… |
| Shell | NONE | NONE | — | No subprocess, os.system, or shell execution found |
| Environment | READ | READ | ✓ Aligned | scripts/run_interview.py:75-95 reads API keys from env vars; no key exfiltration |
| Skill Invoke | NONE | NONE | — | No inter-skill invocation |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser access |
| Database | NONE | NONE | — | No database access |
3 findings
Medium External URL 外部 URL
https://models.audiozen.cn/v1 scripts/run_interview.py:83 Medium External URL 外部 URL
https://api.senseaudio.cn/v1/audio/transcriptions scripts/run_interview.py:89 Medium External URL 外部 URL
https://api.senseaudio.cn/v1/t2a_v2 scripts/run_interview.py:95 File Tree
6 files · 28.5 KB · 925 lines Python 1f · 511L
Markdown 3f · 409L
Text 1f · 3L
YAML 1f · 2L
├─
▾
agents
│ └─
openai.yaml
YAML
├─
▾
references
│ ├─
prompts_cn.md
Markdown
│ └─
state_schema_cn.md
Markdown
├─
▾
scripts
│ └─
run_interview.py
Python
├─
requirements.txt
Text
└─
SKILL.md
Markdown
Dependencies 3 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
openai | >=1.30.0 | pip | No | Lower-bounds pin only |
requests | >=2.31.0 | pip | No | Lower-bounds pin only |
python-dotenv | >=1.0.0 | pip | No | Lower-bounds pin only |
Security Positives
✓ SKILL.md accurately declares all three external API integrations (LLM, ASR, TTS) with their base URLs
✓ No subprocess, shell execution, or command injection found anywhere in the codebase
✓ No credential exfiltration — API keys are read from environment variables and used only for authentication to declared APIs
✓ No obfuscation techniques (no base64, eval, or dynamic code loading)
✓ No access to sensitive paths such as ~/.ssh, ~/.aws, .env, or secrets directories
✓ File writes are scoped to a dedicated outputs/ directory, not system paths
✓ No inter-skill invocation abuse or privilege escalation attempts
✓ Hardcoded fallback defaults (e.g., model names, base URLs) are documented in SKILL.md
✓ Environment variable access is targeted (specific keys), not a broad os.environ iteration
✓ No hidden instructions, HTML comments with payloads, or prompt injection vectors