gpc-sdk-usage
Pass
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: SAFECREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill provides instructions for handling Google Service Account credentials via the
@gpc-cli/authpackage, including loading keys from files or environment variables likeGPC_SERVICE_ACCOUNT. - [EXTERNAL_DOWNLOADS]: The documentation guides users to download and install external Node.js packages
@gpc-cli/apiand@gpc-cli/authfrom the npm registry. - [COMMAND_EXECUTION]: The
scripts/detect_gpc.mjsscript performs environment detection by executing shell commands such asgpc --versionandgpc auth statususingexecSync. - [PROMPT_INJECTION]: The skill creates a surface for indirect prompt injection by facilitating the retrieval and processing of untrusted content from the Google Play Store.
- Ingestion points: Data enters the agent's context through methods like
client.reviews.listandclient.listings.getdocumented inSKILL.mdandreferences/api-reference.md. - Boundary markers: The provided code examples lack explicit boundary markers or instructions to treat retrieved data as untrusted content.
- Capability inventory: The skill possesses state-changing capabilities, such as
client.reviews.replyandclient.edits.commit, which could be targeted by an injection attack. - Sanitization: There is no evidence of content sanitization or validation for the retrieved data before it is used in logic or displayed to the user.
Audit Metadata