Trusted — Risk Score 5/100
Last scan:16 hr ago Rescan
5 /100
senseaudio-voice-ab-lab
Generate multiple spoken ad variants from a typed or spoken brief, transcribe voice memos with AudioClaw ASR, and synthesize variants with the same AudioClaw voice for A/B testing.
AudioClaw Voice AB Lab is a legitimate commercial voice A/B testing skill that uses AudioClaw ASR and TTS APIs; no malicious behavior, credential theft, or undeclared capabilities were found.
Skill Namesenseaudio-voice-ab-lab
Duration53.4s
Enginepi
Safe to install
No action needed. The skill is safe to deploy. Consider pinning SenseAudio API key dependencies for supply-chain hygiene.

Findings 1 items

Severity Finding Location
Low
Bootstrap parent-directory path traversal Priv Escalation
_bootstrap_shared_senseaudio_env() walks parent directories looking for _shared/senseaudio_env.py and adds it to sys.path. This is a common Python packaging pattern but could theoretically load a file from an unexpected parent directory.
for parent in current.parents: candidate = parent / "_shared" / "senseaudio_env.py"
→ Use __file__ directory + a known fixed relative path instead of traversing all parent directories.
scripts/senseaudio_asr.py:14
ResourceDeclaredInferredStatusEvidence
Filesystem WRITE WRITE ✓ Aligned All scripts read/write local files for manifests, audio output, and results — fu…
Network READ READ ✓ Aligned POSTs to AudioClaw ASR/TTS APIs and Feishu webhook — all declared in SKILL.md Re…
Shell NONE READ ✓ Aligned senseaudio_asr.py calls /usr/bin/afinfo via subprocess; send_ab_variants_to_feis…
Environment READ READ ✓ Aligned All scripts read SENSEAUDIO_API_KEY, SENSEAUDIO_PLATFORM_TOKEN from os.environ —…
Skill Invoke NONE NONE No cross-skill invocation found
5 findings
🔗
Medium External URL 外部 URL
https://api.senseaudio.cn/v1/audio/transcriptions
references/asr_brief_pipeline.md:8
🔗
Medium External URL 外部 URL
https://platform.senseaudio.cn/api
references/asr_brief_pipeline.md:13
🔗
Medium External URL 外部 URL
https://api.senseaudio.cn/v1/t2a_v2
scripts/batch_tts_variants.py:31
🔗
Medium External URL 外部 URL
https://open.feishu.cn/open-apis/im/v1/messages?receive_id_type=chat_id
scripts/send_ab_variants_to_feishu.py:119
🔗
Medium External URL 外部 URL
https://platform.senseaudio.cn/api/audio/transcriptions
scripts/senseaudio_asr.py:35

File Tree

12 files · 60.5 KB · 1674 lines
Python 8f · 1373L Markdown 3f · 297L YAML 1f · 4L
├─ 📁 agents
│ └─ 📋 openai.yaml YAML 4L · 509 B
├─ 📁 references
│ ├─ 📝 asr_brief_pipeline.md Markdown 30L · 1.7 KB
│ └─ 📝 commercial_ab_patterns.md Markdown 73L · 1.6 KB
├─ 📁 scripts
│ ├─ 🐍 batch_tts_variants.py Python 171L · 6.1 KB
│ ├─ 🐍 build_voice_ab_variants.py Python 230L · 7.4 KB
│ ├─ 🐍 export_ab_review_csv.py Python 55L · 2.0 KB
│ ├─ 🐍 extract_spoken_brief.py Python 106L · 4.0 KB
│ ├─ 🐍 run_spoken_brief_pipeline.py Python 170L · 5.9 KB
│ ├─ 🐍 run_typed_brief_pipeline.py Python 152L · 5.4 KB
│ ├─ 🐍 send_ab_variants_to_feishu.py Python 217L · 8.4 KB
│ └─ 🐍 senseaudio_asr.py Python 272L · 9.8 KB
└─ 📝 SKILL.md Markdown 194L · 7.7 KB

Dependencies 3 items

PackageVersionSourceKnown VulnsNotes
senseaudio_api_guard unpinned import No Imported from _shared; not in requirements.txt
audioclaw_paths unpinned import No Imported from _shared; not in requirements.txt
imageio-ffmpeg unpinned optional No Optional fallback for ffmpeg; no known vulnerabilities

Security Positives

✓ SKILL.md is comprehensive and accurately describes all 8 scripts, their purposes, and API key dependencies
✓ No base64-encoded strings, eval(), or anti-analysis techniques found in any script
✓ No access to sensitive paths such as ~/.ssh, ~/.aws, .env, or /etc
✓ No credential exfiltration — API keys are only used as Bearer tokens for AudioClaw/Feishu API calls
✓ No curl|bash or wget|sh remote script execution
✓ No hidden HTML comments or prompt injection instructions
✓ Subprocess calls are limited to legitimate CLI tools (afinfo, ffmpeg) documented and necessary for audio processing
✓ All external URLs are documented, named AudioClaw and Feishu API endpoints — no direct IP exfiltration
✓ API key bootstrap from ~/.audioclaw/workspace/state/senseaudio_credentials.json is explicitly declared in SKILL.md
✓ The load_helper_module() function in send_ab_variants_to_feishu.py correctly scopes path traversal to a named skill directory