google-workspace

Fail

Audited by Snyk on Feb 22, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The code routes OAuth flows through a third‑party cloud function and explicitly POSTs refresh tokens to a remote URL (default: google-workspace-extension.geminicli.com), which is a clear data‑exfiltration/credential‑theft pattern; otherwise there is no obfuscated payload, remote shell, eval/exec, or hidden persistent backdoor code.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's workspace.js helper explicitly calls Google Workspace APIs (e.g., docs.documents.get, drive files.list, gmail messages.get) and SKILL.md instructs the agent to "use workspace.js call" and post-process the returned JSON, so it fetches user-generated third-party content (Docs/Drive/Gmail) that the agent will read and could contain instructions that influence subsequent actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.70). The skill will auto-run npm install at runtime (installDependencies), which fetches packages from the npm registry (e.g. https://registry.npmjs.org) and then requires/executes those modules in-process, meaning remote code is fetched and executed.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 22, 2026, 07:24 PM