baoyu-danger-gemini-web
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
node:child_processandspawnto launch browser executables (Chrome, Edge, Chromium) with sensitive flags like--remote-debugging-portto automate cookie extraction. It also usesexecSyncto run system commands for path resolution in WSL environments. - [DATA_EXFILTRATION]: To authenticate, the skill programmatically accesses and scrapes sensitive browser session cookies (
__Secure-1PSID,__Secure-1PSIDTS) from the user's local browser profile and caches them in a local JSON file. While this data is sent to Google's official domains, the automated extraction of credentials from browser profiles is a high-privilege operation. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. It includes features to concatenate local files (
--promptfiles) and process images (--reference) into the AI's context window. If these files contain malicious instructions, the agent may execute them. - Ingestion points: Prompts are read from CLI arguments, standard input, and files via
readFileinscripts/main.tsandscripts/gemini-webapi/utils/upload-file.ts. - Boundary markers: None identified. External content is interpolated directly into request payloads.
- Capability inventory: The skill can execute local scripts via
bun, write files (images and sessions), and perform network operations to Google services. - Sanitization: There is minimal sanitization of external content beyond standard JSON serialization before it is sent to the Gemini API.
- [EXTERNAL_DOWNLOADS]: The skill interacts with unofficial Google endpoints (
gemini.google.com/_/BardChatUi/...) and downloads generated images fromgoogleusercontent.combased on model outputs.
Audit Metadata