nano-banana-pro-openrouter
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The
SKILL.mddocumentation recommends installing theuvtool usingcurl | shon Linux/macOS andirm | iexon Windows. This 'piped remote execution' pattern is highly dangerous as it executes unverified code directly from an external domain (astral.sh) which is not in the trusted source list. - COMMAND_EXECUTION (MEDIUM): In
scripts/generate_image.py, the--filenameargument is used directly to define the output path forwrite_bytes. The script also performsmkdir(parents=True, exist_ok=True)on the parent directory. Without path sanitization, an attacker or a hijacked prompt could specify paths like~/.bashrcor~/.ssh/authorized_keysto overwrite sensitive files. - DATA_EXFILTRATION (LOW): The script reads local image files provided via
--input-imageand transmits their base64-encoded content tohttps://openrouter.ai/api/v1. While this is the intended functionality, it involves sending potentially sensitive local data to a third-party API. - PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection via the image ingestion surface.
- Ingestion points: Local image files provided via the
--input-imageargument inscripts/generate_image.py. - Boundary markers: Absent; images are encoded and sent to the LLM without delimiters or instructions to ignore embedded content.
- Capability inventory: The script possesses file-read (input), file-write (output to arbitrary paths), and network access (OpenRouter API).
- Sanitization: None; the script does not validate image metadata or content for adversarial instructions before processing.
Recommendations
- AI detected serious security threats
Audit Metadata