gemini-imagegen
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): Path Traversal Vulnerability. The scripts
generate_image.py,edit_image.py, andcompose_images.pytake anoutputpath directly from command-line arguments and pass it toPIL.Image.save()without validation. Evidence:image.save(output_path)in multiple files. Risk: An attacker could overwrite sensitive files (e.g.,.bashrc,.ssh/authorized_keys) if the agent is induced to provide a malicious path. - [PROMPT_INJECTION] (MEDIUM): Indirect Prompt Injection Surface. The skill accepts free-text instructions that are interpolated directly into the Gemini API request. Ingestion points:
promptandinstructionparameters in all Python scripts. Boundary markers: Absent. Capability inventory: File system write operations and network access (Gemini API). Sanitization: Absent. Risk: If the agent processes data from untrusted sources, an attacker could inject instructions to manipulate the image generation process or create deceptive content.
Recommendations
- AI detected serious security threats
Audit Metadata