ai-multimodal
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Indirect Prompt Injection (HIGH): The skill possesses a significant attack surface for indirect prompt injection. It is designed to ingest and process untrusted external data, including PDFs, images, and videos (via
document_converter.pyandgemini_batch_process.py). Because the skill is grantedWriteandEditpermissions inSKILL.md, a malicious instruction embedded in media (e.g., hidden text in a PDF or OCR-able text in an image) could theoretically trigger the agent to perform unauthorized file modifications. No sanitization or explicit boundary markers for untrusted content were observed in the provided script logic. - Dynamic Execution (MEDIUM): In
scripts/check_setup.py, the skill attempts to dynamically load a script from the user's home directory (Path.home() / '.claude' / 'scripts' / 'resolve_env.py') by modifyingsys.path. Loading code from computed paths outside the skill's distribution folder is a security risk as it makes the skill dependent on the integrity of the user's home directory environment. - Command Execution (LOW): The skill explicitly requests the
Bashtool and provides tips inSKILL.mdto pipe data into ageminicommand-line utility. While standard for this type of utility, it increases the risk that successful prompt injections could escalate to arbitrary command execution. - Data Exposure (INFO): The
scripts/check_setup.pyscript prints a 'Key preview' of theGEMINI_API_KEY(api_key[:20]...api_key[-4:]). While intended for debugging, this exposes portions of the sensitive credential to logs or terminal output.
Recommendations
- AI detected serious security threats
Audit Metadata