LrshuAI Text To Speech

PassAudited by VirusTotal on Apr 3, 2026.

Findings (1)

The skill contains a prompt injection in SKILL.md that explicitly instructs the AI agent to bypass the standard 'openclaw run' execution path and instead run the Python script directly, which may be an attempt to evade platform-level monitoring or sandboxing. The script 'script/invoke_model.py' sends the user's 'TEAM_API_KEY' to a third-party endpoint (dlazy.com), and while this appears to be the intended API gateway, the combination of bypassing standard protocols and using a non-standard backend is a significant security risk.