research
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (HIGH): The skill explicitly instructs the agent to execute a bash command
gemini -m gemini-2.5-flash -p "...". This execution occurs within a workflow that incorporates untrusted data from external searches into command parameters, posing a risk of command injection if parameters are not strictly sanitized.- PROMPT_INJECTION (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8). It ingests untrusted data from the web viaWebSearchanddocs-seeker(GitHub) in Phase 2. There are no defined boundary markers or sanitization logic to prevent malicious instructions hidden in these external sources from hijacking the research process or the subsequentgeminiCLI call. This meets the criteria for HIGH severity as the skill combines external content ingestion with execute capabilities.- EXTERNAL_DOWNLOADS (MEDIUM): The workflow relies on ageminiCLI tool and thedocs-seekerskill. Whilegoogle-geminiis a trusted organization, the generic reference to a bash commandgeminiwithout versioning or source verification introduces a dependency risk if the local environment is compromised or the tool is sourced from an untrusted repository.
Recommendations
- AI detected serious security threats
Audit Metadata