gpc-monetization
Pass
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The detection script
scripts/detect_gpc.mjsexecutesnpx gpc, which can trigger a download and execution of thegpcpackage from the npm registry if the tool is not already installed locally. - [COMMAND_EXECUTION]: The skill relies on shell command execution for its primary functions. Inputs provided by users or extracted from files (such as product IDs, tokens, and base64-encoded payloads) are interpolated into CLI commands, which may lead to command injection if the agent does not properly sanitize these inputs.
- [PROMPT_INJECTION]: The skill ingests untrusted external data that enters the agent's execution context, creating an indirect prompt injection surface.
- Ingestion points: JSON configuration files for subscriptions and in-app products (
--fileand--dirarguments) and base64-encoded notification payloads (gpc rtdn decode). - Boundary markers: No specific delimiters or safety instructions are provided to the agent to distinguish between data and potentially embedded instructions within these inputs.
- Capability inventory: The skill allows for the creation, modification, and deletion of monetization assets on the Google Play Console, as well as the retrieval of financial order and purchase information.
- Sanitization: The skill does not implement validation or sanitization for the content of JSON files or the results of payload decoding before the agent processes them.
Audit Metadata