gemini-infographic
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because user descriptions are directly concatenated into the system prompt sent to the Gemini model in
scripts/generate_infographic.mjs. - Ingestion points: The
--promptcommand-line argument accepts arbitrary user text. - Boundary markers: No delimiters or safety instructions are used to isolate user input from the rest of the prompt.
- Capability inventory: The script performs file system operations (creating directories and writing PNG/JPG/WebP files) and makes network calls to the Google Gemini API.
- Sanitization: No input validation or sanitization is performed on the user-supplied content before it is processed.
- [COMMAND_EXECUTION]: The
generate_infographic.mjsscript allows users to specify an output directory and filename via--outputand--nameparameters. These are used inpath.join()without verification, creating a surface for path traversal attacks where a malicious agent could be directed to write files to sensitive system locations. - [DATA_EXFILTRATION]: The script accesses a configuration file at
~/.config/gemini/config.jsonto retrieve API credentials. While this is standard for CLI tools, the access to a sensitive configuration path should be noted as a data exposure surface.
Audit Metadata