nano-banana-2
Fail
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches the
infshCLI installation script from the vendor's official domain (cli.inference.sh). - [COMMAND_EXECUTION]: The skill uses the
Bashtool to executeinfshcommands. This is restricted to the vendor's specific tool via theinfsh *pattern. - [REMOTE_CODE_EXECUTION]: The installation instructions include a
curl | shpattern directed at the vendor's own infrastructure (https://cli.inference.sh). This is the standard deployment method for this vendor's tools. - [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface by allowing the ingestion of untrusted data from external sources.
- Ingestion points: The
imagesarray in the input JSON allows users to provide external URLs that are processed by the Gemini model via theinfshtool. - Boundary markers: No explicit boundary markers or instructions to ignore embedded content are present in the command templates.
- Capability inventory: The skill has the capability to execute the
infshCLI tool viaBashsubprocesses. - Sanitization: There is no evidence of sanitization or validation of the remote image content before it is passed to the model.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
Audit Metadata