bridge-gemini
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill invokes the
geminiCLI andpython3via subprocess calls to check settings and execute prompts. It uses thetimeoututility to manage execution duration and includes the--approval-mode planflag to ensure safety during analysis tasks. - [DATA_EXFILTRATION]: Accesses configuration files located at
~/.gemini/settings.jsonand.gemini/settings.json. While these files contain tool settings rather than credentials, accessing files in the user's home directory is noted as a sensitive operation. - [EXTERNAL_DOWNLOADS]: Documentation references external installation sources for the
gemini-clitool via NPM and Homebrew. These are provided as setup instructions and are not automatically executed by the skill scripts. - [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for indirect prompt injection by ingesting data from local configuration files to determine execution behavior. 1. Ingestion points:
.gemini/settings.jsonand~/.gemini/settings.jsonin SKILL.md. 2. Boundary markers: None present for the configuration data ingestion. 3. Capability inventory: Subprocess execution ofpython3andgeminiCLI in SKILL.md. 4. Sanitization: Employs a Python one-liner to parse JSON and extract specific keys, providing basic structural validation.
Audit Metadata