baoyu-danger-gemini-web
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill uses
child_process.spawnto launch browser executables (Chrome, Edge, Chromium) found on the system inscripts/gemini-webapi/utils/load-browser-cookies.ts. It enables--remote-debugging-port, which opens a local network port allowing any process on the machine to control the browser and access its data. - [CREDENTIALS_UNSAFE] (HIGH): The skill programmatically extracts sensitive Google authentication cookies (
__Secure-1PSIDand__Secure-1PSIDTS) from the user's browser profile. This bypasses standard security boundaries for session data and places the user's Google account at risk if the skill's environment or data directory is compromised. - [EXTERNAL_DOWNLOADS] (HIGH): A path traversal vulnerability exists in
scripts/gemini-webapi/types/image.ts. Thesavemethod derives the local filename directly from the URL usingthis.url.split('/').pop(). A malicious URL containing path traversal sequences (e.g.,../../.bashrc) could be used to overwrite sensitive files when the agent is instructed to save a 'generated' image. - [COMMAND_EXECUTION] (MEDIUM): The
SKILL.mdinstructions encourage usage vianpx -y bun, which automatically downloads and executes packages, potentially leading to supply chain risks if dependencies are hijacked. - [DATA_EXFILTRATION] (LOW): While the skill sends cookies to legitimate Google endpoints (
gemini.google.com), the automated movement of browser cookies to a CLI-accessible file (cookies.json) significantly increases the attack surface for sensitive data.
Recommendations
- AI detected serious security threats
Audit Metadata