ai-multimodal
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- CREDENTIALS_UNSAFE (MEDIUM): The
scripts/check_setup.pyutility prints the first 20 and last 4 characters (total 24) of theGEMINI_API_KEYto the console during setup. This level of exposure is excessive for a sensitive secret and poses a risk of credential leakage via logs or terminal captures.\n- COMMAND_EXECUTION (MEDIUM): Thescripts/check_setup.pyscript dynamically adds~/.claude/scripts/to the Python search path and imports a module namedresolve_env. Loading executable code from a non-standard, user-writable directory is a medium-severity dynamic execution risk.\n- PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection (Category 8) because its primary function is processing untrusted multimedia files (PDF, Audio, Video, Image).\n - Ingestion points: Files are ingested through
scripts/gemini_batch_process.pyandscripts/document_converter.pyand passed to the LLM.\n - Boundary markers: The skill lacks explicit delimiters or instructions for the model to ignore embedded commands in the processed media data.\n
- Capability inventory: The skill has capabilities for network access (Gemini API), file system operations, and potentially shell command execution as suggested in the quick start tip.\n
- Sanitization: No evidence of content sanitization or validation of the media content is performed prior to processing via the LLM.\n- PROMPT_INJECTION (LOW): The recommended usage pattern in
SKILL.mdpipes arbitrary user-provided strings directly into a CLI tool, which creates a surface for direct prompt injection if not handled securely by the agent.
Audit Metadata