gemini-image
Fail
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill instructs the agent to read the contents of
config/secrets.md, which is a sensitive file path specifically used for storing private authentication tokens and secrets. - [DATA_EXFILTRATION]: Sensitive credentials retrieved from the local filesystem are transmitted to a non-trusted third-party domain (
https://api.apicore.ai/v1/images/generations) via an Authorization header. This pattern of reading local secrets and sending them to a third-party service provider constitutes a high-risk data exfiltration vector. - [COMMAND_EXECUTION]: The skill uses the
curlcommand to perform network operations. When combined with sensitive file access, this provides a direct mechanism for the exfiltration of credentials or other local data to external endpoints. - [PROMPT_INJECTION]: The skill demonstrates an indirect prompt injection surface. 1. Ingestion points: Untrusted user input is accepted in the form of image descriptions and URLs. 2. Boundary markers: Absent; user-supplied content is interpolated directly into a JSON payload for a shell command. 3. Capability inventory: Uses
curlfor network access to external APIs. 4. Sanitization: Absent; there is no validation or filtering of the input before it is used in the network request.
Recommendations
- AI detected serious security threats
Audit Metadata