claude-use-gemini-acp
Warn
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/gemini-delegate.mjsspawns the Gemini CLI with the--yolo(or-y) flag. This flag is explicitly designed to auto-approve all tool calls requested by the Gemini model. This creates a vector for autonomous command execution or filesystem manipulation on the local host if the model is successfully subverted. - [EXTERNAL_DOWNLOADS]: The skill uses
pnpm dlxto dynamically download and execute the@google/gemini-clipackage. While the package belongs to a well-known technology company, the use ofnightlyversions and runtime downloads introduces dependency management risks and increases the impact of potential supply chain issues. - [PROMPT_INJECTION]: The skill is highly vulnerable to indirect prompt injection (Category 8). It facilitates a chain where untrusted data processed by the agent can be passed to a secondary model that has been granted autonomous execution permissions.
- Ingestion points: Command-line arguments in
scripts/gemini-delegate.mjscapture the prompt text. - Boundary markers: Absent. The prompt is passed to the Gemini model as raw text without delimiters or instructions to ignore embedded commands.
- Capability inventory: The spawned
gemini-clihas access to local filesystem tools and networking, governed by the--yoloauto-approval policy. - Sanitization: Absent. There is no validation or filtering of the prompt text before delegation.
- [DATA_EXFILTRATION]: Because the delegated model has autonomous tool access and no user-in-the-loop confirmation (via
--yolo), it could be instructed via a malicious prompt to read sensitive local files (e.g.,.env, SSH keys, or cloud credentials) and transmit them to an external endpoint via its own toolset.
Audit Metadata