notebooklm
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The
scripts/setup_environment.pyfile automatically installs Python packages fromrequirements.txtand a browser viapatchright install chromeat runtime. This dynamic installation and execution of external code lacks integrity verification. - CREDENTIALS_UNSAFE (HIGH): The skill implements a 'Hybrid Authentication' approach (documented in
AUTHENTICATION.md) that saves active Google session cookies todata/browser_state/state.json. These cookies are manually injected into browser sessions, allowing the skill to operate with the user's full Google identity. - COMMAND_EXECUTION (MEDIUM): The
scripts/run.pyscript acts as a wrapper that dynamically constructs and executes shell commands usingsubprocess.runto launch other scripts and manage the virtual environment. - EXTERNAL_DOWNLOADS (MEDIUM): During setup, the skill downloads binaries (Chrome) and third-party packages from PyPI. While these are from known registries, the automated nature and the use of the
patchrightanti-detection fork increase the risk profile. - PROMPT_INJECTION (LOW):
SKILL.mdincludes several 'CRITICAL' instructions intended to override the agent's default behavior, such as 'STOP - Do not immediately respond to user' and 'NEVER call scripts directly'. These are used to enforce specific tool-use workflows.
- INDIRECT_PROMPT_INJECTION (LOW): The skill possesses a significant attack surface for indirect prompt injection.
- Ingestion points:
ask_question.pyreceives untrusted user input via the--questionargument and navigates to arbitrary URLs via--notebook-url. - Boundary markers: Absent. No delimiters or warnings are used when passing user-provided questions to the browser automation.
- Capability inventory: Full browser automation via
patchrighton a logged-in Google account, plus the ability to execute local scripts viasubprocessinrun.py. - Sanitization: Absent. The input is passed directly to the browser typing engine in
StealthUtils.human_type.
Recommendations
- AI detected serious security threats
Audit Metadata