gemini-gen
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The script
scripts/gemini_gen.pycontains a hardcodedCLIENT_SECRET('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') for Google OAuth. Hardcoding production secrets allows for credential theft and potential abuse of the associated Google Cloud project. - [DATA_EXFILTRATION] (HIGH): The skill accesses a sensitive local file path:
~/Library/Application Support/alma/plugin-storage/antigravity-auth/secrets.json. It extractsrefreshTokenandprojectIdfrom another plugin's private storage. Accessing credentials stored by other applications is a highly suspicious behavior characteristic of credential harvesting. - [COMMAND_EXECUTION] (LOW): The script uses
subprocess.runto execute theopencommand on macOS. While used for the legitimate purpose of displaying the generated image, it interacts with the system shell using a dynamically determined filename. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill ingests untrusted user input (the image prompt) and sends it to an external API. While the output (image bytes) is decoded and saved, the capability tier is LOW as it does not involve executing the returned content as code or using it for high-privilege decisions.
Recommendations
- AI detected serious security threats
Audit Metadata