google-sheets-skill
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFEDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The script
sheets_skill.pyaccesses sensitive Google OAuth credential files (credentials.json) and session tokens stored in thetokens/directory. It is designed to proactively search for these credentials in the~/.claude/skills/gmail-skill/directory, which involves cross-skill data access to facilitate shared authentication across the author's tools. - [PROMPT_INJECTION]: The skill has an indirect prompt injection attack surface because it processes data from external spreadsheets that could contain malicious instructions.
- Ingestion points: Data from Google Sheets is ingested via the
readandgetcommands insheets_skill.py. - Boundary markers: The script does not use explicit delimiters or instructions to treat the ingested sheet data as untrusted or to ignore any commands embedded within cells.
- Capability inventory: The skill provides full write, append, clear, and management (create/delete) capabilities for Google Sheets and Google Drive via the
sheetsanddriveservices. - Sanitization: Output is JSON-serialized, which ensures data structure but does not sanitize or filter the content of the cells for potential prompt injection patterns.
- [COMMAND_EXECUTION]: The skill relies on the
Bashtool to execute thesheets_skill.pyscript. It usesargparseto handle command-line arguments, which mitigates simple shell injection but requires the agent to provide sanitized inputs for spreadsheet IDs and values.
Audit Metadata