skills/jeremylongshore/claude-code-plugins-plus-skills/adk-deployment-specialist/Gen Agent Trust Hub
adk-deployment-specialist
Fail
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- [DATA_EXFILTRATION]: The script
scripts/test-a2a-protocol.pyprogrammatically retrieves a Google Cloud access token via thegcloud auth print-access-tokencommand. This token is subsequently included in theAuthorizationheader of network requests made to a user-supplied URL. This design allows for the transmission of sensitive credentials to any remote endpoint, posing a critical exfiltration risk if a malicious URL is provided. - [COMMAND_EXECUTION]: The skill uses the
Bashtool and shell scripts to perform operations. Thescripts/deploy-agent.shscript is vulnerable to command injection because it interpolates unsanitized shell variables (such asAGENT_DIR) directly into a Python execution string (python3 -c "..."). A malicious input could break out of the string context to execute arbitrary code. The scriptscripts/test-a2a-protocol.pyalso executes shell commands viasubprocess.runto interact with the GCP CLI. - [CREDENTIALS_UNSAFE]: The skill's automated tests are designed to fetch and utilize active session credentials (GCP access tokens) from the local environment. While intended for testing the A2A protocol, this programmatic access to long-lived or session-based tokens increases the attack surface for credential theft.
- [EXTERNAL_DOWNLOADS]: The deployment script
scripts/deploy-agent.shautomatically fetches and installs Python packages (google-cloud-aiplatform,google-adk) from public registries usingpipif they are not already present in the environment.
Recommendations
- AI detected serious security threats
Audit Metadata