Nano Banana 2
AdvisoryAudited by Static analysis on Apr 30, 2026.
Overview
No suspicious patterns detected.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Installing the CLI means trusting software downloaded from inference.sh before using the skill.
The documented setup runs a remote shell installer for the inference.sh CLI. This is disclosed and purpose-aligned, but the installer code is not part of the provided artifacts.
curl -fsSL https://cli.inference.sh | sh && infsh login
Use the manual install and checksum verification path if possible, and install only if you trust inference.sh as a provider.
The agent can invoke inference.sh commands while using this skill, which may send requests to the provider or consume usage credits depending on the account.
The skill allows the agent to run the inference.sh CLI broadly rather than only one exact image-generation command. This is relevant because CLI actions may contact external services or use account resources.
allowed-tools: Bash(infsh *)
Review requested infsh actions before approving sensitive prompts, private images, or potentially costly runs.
Generated image requests may run under the user's inference.sh account and may be associated with that account's permissions or billing.
The quick start requires logging in to inference.sh, so use of the skill may depend on an authenticated account/session.
infsh login
Use an account with appropriate limits and avoid granting more access than needed for image generation.
Prompts and image inputs may leave the local environment and be handled by third-party services.
The core workflow sends generation prompts, and potentially input images, through inference.sh to a Google image model. This external data flow is expected for the skill's purpose.
Generate images with Google Gemini 3.1 Flash Image Preview via [inference.sh](https://inference.sh) CLI.
Do not submit confidential images, private documents, or sensitive personal information unless the provider's terms and data handling are acceptable.
