Gemini Sub-Agent

PassAudited by VirusTotal on May 11, 2026.

Findings (1)

The skill bundle is classified as suspicious due to instructions in `SKILL.md` that direct the OpenClaw agent to use the Google Gemini sub-agent in 'yolo mode' (`-y`). This mode explicitly 'auto-approves all file writes and shell commands,' granting the Gemini sub-agent autonomous and unconstrained execution capabilities on the host system. While the skill bundle itself does not contain malicious code, this design choice introduces a critical remote code execution (RCE) vulnerability. If the Gemini sub-agent is subsequently given a malicious prompt, it could lead to arbitrary command execution or file manipulation, making the system highly susceptible to prompt injection attacks against the sub-agent. The `scripts/setup.sh` file performs standard installations and creates a benign wrapper script, but the core issue lies in the delegated, unconstrained execution instruction.