Antigravity Image Generator
Analysis
This image generator appears purpose-built, but it should be reviewed because it reads local Google OAuth credentials and calls an internal Google API using a hardcoded project fallback and headers meant to bypass deprecation checks.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
const ENDPOINT = "https://daily-cloudcode-pa.sandbox.googleapis.com/v1internal:streamGenerateContent?alt=sse"; ... // IMPORTANT: Version bump to bypass deprecation checks ... 'User-Agent': 'antigravity/2.0.0 darwin/arm64'
The code calls an internal API endpoint and explicitly sets client headers to bypass deprecation checks, which is an unsafe provider/API escape-hatch behavior.
Source: unknown; Homepage: none; Version: 2.0.0
The package has no public source or homepage, and the included _meta/origin files record version 1.0.0, creating provenance/version ambiguity around code that handles OAuth credentials.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
const profiles = JSON.parse(fs.readFileSync(PROFILE_PATH, 'utf8')); ... const FALLBACK_PROJECT_ID = "junoai-465910"; ... token = auth.access; if (auth.projectId) projectId = auth.projectId;
The script reads the local auth profile, extracts a Google Antigravity OAuth access token, and falls back to a hardcoded project ID when the profile lacks one.
