Voice Memo

PassAudited by VirusTotal on May 11, 2026.

Findings (1)

The `scripts/send-voice-memo.sh` file contains a shell injection vulnerability. The `RECIPIENT` variable, which can be controlled by user input, is directly embedded into the `CHAT_GUID` string and then passed as a `--form-string` argument to `curl` without proper shell escaping. This allows an attacker to inject arbitrary shell commands by crafting the recipient phone number, leading to potential remote code execution. There is no evidence of intentional malicious behavior such as data exfiltration or persistence mechanisms.