image-gen
Warn
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill is designed to retrieve sensitive information, such as API keys, from specific local paths outside the skill's own directory.
- Evidence:
SKILL.mdinstructs the environment setup to source from~/Library/Mobile Documents/com~apple~CloudDocs/Geoffrey/secrets/.env. - Evidence: All scripts (
generate.py,edit.py,compose.py) attempt to load asecrets.pymodule from a path reaching four levels above the script directory (../../../../scripts/secrets.py). - [COMMAND_EXECUTION]: The
generate.pyscript utilizes dynamic Python module loading to execute logic from computed filesystem paths. - Evidence: The script uses
importlib.util.spec_from_file_locationto dynamically load both the global secrets module and brand-specific scripts (brand.py) based on the--brandargument. - [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection where malicious instructions could be hidden within images processed by the vision model.
- Ingestion points:
scripts/edit.pyingests an input image, andscripts/compose.pyingests up to 14 reference images via the--refsflag. - Boundary markers: Absent. The instructions do not include delimiters or specific warnings to the model to ignore instructions embedded within the image data.
- Capability inventory: The skill is granted
Bash,Read, andWritepermissions. The Python scripts perform file system operations (read/write) and network requests to the Gemini API. - Sanitization: Absent. There is no pre-processing or validation of the image content to detect or neutralize embedded text instructions before they are processed by the Gemini model.
Audit Metadata