baoyu-danger-gemini-web
Fail
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
node:child_processto spawn web browsers including Google Chrome, Microsoft Edge, and Chromium with the--remote-debugging-portflag enabled to programmatically control the browser via the Chrome DevTools Protocol (CDP). - [COMMAND_EXECUTION]: In
scripts/gemini-webapi/utils/paths.ts, the skill usesexecSyncto executecmd.exeon WSL systems to retrieve the Windows user profile path. - [CREDENTIALS_UNSAFE]: The skill programmatically extracts highly sensitive session cookies (
__Secure-1PSIDand__Secure-1PSIDTS) from the user's browser profile to authenticate requests to Google services. - [CREDENTIALS_UNSAFE]: Extracted authentication cookies and session tokens are cached in plain text within a local JSON file (
cookies.json) located in the application data directory.
Recommendations
- AI detected serious security threats
Audit Metadata