I don't have the expertise to spot if someone's able to pull some dark wizard shit and encode a binary in audio and get it to execute it or something
Seriously though I know enough to know I won't spot some obscure bad practice in someone else's code base, even without network access if someone gets onto my system some other way it could give them a route to escalate
Oh I have no doubt it's legitimate, my concern is just that it's unmaintained