gemini-consultation
Audited by Socket on Feb 24, 2026
1 alert found:
Obfuscated FileThe described tool is functionally consistent with a legitimate Gemini integration: it requires a GEMINI_API_KEY, accepts text and files, and points to the official Gemini docs. The main security concern is supply-chain and operational: the README recommends running unpinned, auto-installed code via 'npx -y' and references an external local script without providing its contents. That download-and-execute pattern can expose local files and credentials to arbitrary code. No explicit malicious code is present in the provided fragment, but because the actual runtime code (npm package or shell script) is not included, you should treat this as a potential supply-chain risk until the remote package and any scripts are audited. Recommendations: do not run the npx command blindly; audit the npm package source, pin versions and verify checksums, prefer installing from a vetted source, run in a constrained environment, and use least-privilege/short-lived credentials for GEMINI_API_KEY.