Gemini Ops

WarnAudited by ClawScan on May 10, 2026.

Overview

Gemini Ops is aligned with refreshing Gemini MCP auth, but it extracts and stores Google session cookies while delegating the main work to unreviewed hard-coded local scripts.

Install or invoke this only if you intentionally want an agent to reuse your logged-in Google/Gemini browser session. Audit the external /home/moltuser/clawd helper scripts first, lock down Chromium remote debugging and x11vnc, protect ~/.mcporter/mcporter.json, and avoid using it on shared or untrusted hosts.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the skill can reuse your logged-in Google/Gemini session and persist session cookies where other local processes or the MCP server may use them.

Why it was flagged

These are reusable Google session cookies. Storing them in MCP configuration gives the MCP server delegated access to the user's Gemini/Google session.

Skill content
Extract `__Secure-1PSID` and `__Secure-1PSIDTS` from the Gemini tab via CDP `Network.getCookies`. ... Write cookies to `~/.mcporter/mcporter.json` (`mcpServers.gemini.env`).
Recommendation

Use only on a trusted single-user host, protect ~/.mcporter/mcporter.json permissions, require explicit approval before refresh, and log out or rotate the session if the host or scripts are not trusted.

What this means

A missing, replaced, or compromised local helper at that path could run arbitrary auth-refresh behavior, including accessing Google session cookies, without being visible in this skill package.

Why it was flagged

The included ON script delegates to a hard-coded helper outside the provided skill manifest; that helper is the component expected to drive Chromium, extract cookies, and edit MCP config.

Skill content
/home/moltuser/clawd/scripts/gemini-on.sh
Recommendation

Package the real helper scripts with the skill or pin and verify their source and hashes; users should audit those external scripts before invoking the skill.

What this means

Invoking shutdown could disrupt other browser or GUI/VNC work on the host if the external script uses broad process matching or cleanup.

Why it was flagged

The OFF workflow is documented as controlling local browser/GUI/VNC processes and cleanup, but the artifacts do not bound it to skill-created PIDs, profiles, or paths.

Skill content
Stop Chromium and related GUI processes (x11vnc/Xvfb/openbox), then clean leftovers.
Recommendation

Scope shutdown to tracked PIDs and skill-owned temp/profile paths, show what will be stopped or removed, and provide a dry-run or confirmation for destructive cleanup.

What this means

Users relying on registry metadata could underestimate that the skill handles persistent account-session material and mutates MCP configuration.

Why it was flagged

The registry metadata does not disclose credentials or config paths, while the skill documentation says it extracts Google session cookies and writes ~/.mcporter/mcporter.json.

Skill content
Required env vars: none; Env var declarations: none; Primary credential: none; Required config paths: none
Recommendation

Declare the Google session-cookie dependency, ~/.mcporter/mcporter.json access, Linux/GUI requirements, and external helper dependencies in metadata before publication.