gemini
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (SAFE): The script
scripts/gemini.pyexecutes the 'gemini' binary usingsubprocess.Popenwith an argument list rather than a shell string. This effectively prevents shell injection vulnerabilities. - [PROMPT_INJECTION] (LOW): The skill is vulnerable to indirect prompt injection (Category 8).
- Ingestion points: Untrusted data enters the skill via the
promptargument inscripts/gemini.py. - Boundary markers: None. The prompt is passed directly to the CLI argument without delimiters or 'ignore' instructions.
- Capability inventory: The skill has the capability to execute external commands (
subprocess.Popen) and read/write to the filesystem via theworkdirparameter. - Sanitization: There is no escaping or validation of the input prompt before it is passed to the Gemini model.
Audit Metadata