gemini-cli-session
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill is designed to execute the
geminicommand-line interface tool with various flags including-rfor session resumption and-pfor prompt execution. - [COMMAND_EXECUTION]: By default, the skill uses the
--approval-mode auto_editflag. This allows the Gemini CLI to autonomously usewrite_fileandreplacetools to modify the local filesystem without requiring explicit user confirmation for each edit. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection (Category 8). It ingests untrusted data from multiple sources which are then used to influence the behavior of the
geminiCLI sub-agent. - Ingestion points: Data is read from
<project-root>/.gemini-cli-session-idand historical logs located at~/.gemini/tmp/<project_hash>/logs.json. User-provided prompts are also passed directly to the tool. - Boundary markers: No explicit boundary markers or delimiters are used to separate historical context or session IDs from current instructions when passed to the CLI.
- Capability inventory: The skill possesses the capability to execute shell commands (
gemini) and, through theauto_editmode, the capability to perform arbitrary file writes and modifications. - Sanitization: There is no evidence of sanitization or validation performed on the session IDs or recovered log content before they are used in command execution.
- [DATA_EXPOSURE]: The skill accesses sensitive configuration and history files within the user's home directory (
~/.gemini/projects.jsonand~/.gemini/tmp/*/logs.json) to recover project hashes and session identifiers.
Audit Metadata