image-gen-blockeden-gemini
Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The instructions in
SKILL.mddirect the agent to execute a shell command where the user's input is directly interpolated:python <skill_dir>/scripts/generate_image.py "<prompt>". This pattern is highly susceptible to command injection if the user provides a prompt containing shell metacharacters like semicolons, backticks, or pipes. - [COMMAND_EXECUTION]: The
SKILL.mdfile instructs the agent to download images from user-provided URLs usingcurl -L -o /tmp/ref_image.jpg "<url>". This creates a secondary command injection vector if the URL is not strictly validated or sanitized before execution. - [DATA_EXFILTRATION]: The skill is designed to read local files and upload their base64-encoded content to an external API (
api.blockeden.xyz). An attacker could manipulate the agent into reading and exfiltrating sensitive local configuration files or credentials by masquerading them as image files for processing. - [CREDENTIALS_UNSAFE]: The
scripts/utils.pyscript constructs API request URLs by embedding theBLOCKEDEN_ACCESS_KEYdirectly into the URL path:https://api.blockeden.xyz/gemini/{api_key}. This practice can lead to the exposure of the secret key in server access logs, proxy logs, or network monitoring tools.
Audit Metadata