gdrive-sheets-compute
Fail
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DATA_EXFILTRATION]: The documentation in
SKILL.mdexplicitly encourages a highly insecure sharing practice by instructing the agent to executespreadsheet.share("", perm_type="anyone", role="writer"). This command makes the resulting Google Sheets publicly accessible and editable by anyone with the link, bypassing standard access controls. - [CREDENTIALS_UNSAFE]: The
SKILL.mdfile contains a hardcoded service account email address (booking-preferences@rainbot.iam.gserviceaccount.com). While not a private key, hardcoding specific service identities in public instructions is a poor security practice. - [METADATA_POISONING]: The 'Pitfalls' section in
SKILL.mdcontains technical instructions forweb3.py, Ethereum RPC endpoints (ethereum-rpc.publicnode.com), and blockchain log fetching. These instructions are entirely unrelated to the skill's primary purpose of managing Google Drive and Sheets, which may cause logic confusion or lead the agent to attempt unauthorized network operations. - [COMMAND_EXECUTION]: The skill uses
uv runfor execution and references specific local binary paths (e.g.,~/.nvm/versions/node/v24.11.0/bin/gws), creating a dependency on the host environment's specific file structure and potentially executing unverified binaries. - [EXTERNAL_DOWNLOADS]: The script and documentation facilitate downloads and API interactions with Google Cloud services (
googleapis.com). While these are well-known services, the script requests broader OAuth scopes (drive) than those claimed in the documentation (drive.readonly), granting the skill more permissions than stated.
Recommendations
- AI detected serious security threats
Audit Metadata