The skill uses an unaudited external script, risking
Claims to do
Bria — AI Image Generation, Editing & Background Removal: Commercially safe, royalty-free image generation and editing through 20+ API endpoints. Generate from text, edit with natural language, remove backgrounds, create product shots, and build automated image pipelines.
Actually does
This skill uses `curl` to interact with Bria AI's API endpoints for image generation, editing, and background removal. It performs an OAuth device flow for authentication, storing `access_token`, `refresh_token`, and `api_token` in `~/.bria/credentials`. It contacts Bria's authentication and image processing URLs (e.g., `https://engine.prod.bria-api.com/v2/auth/device/authorize`, `https://engine.prod.bria-api.com/v2/image/generate`), and can process local or remote image files.
openclaw skills install galbria/bria-aiAccess to sensitive environment variables detected
$ACCESS_TOKEN
The skill sources an external shell script (`bria_client.sh`) which is not provided for analysis. The security of the `bria_call` function, handling critical operations like API calls and file encoding, depends entirely on the integrity and security of this unaudited script.
source ~/.agents/skills/bria-ai/references/code-examples/bria_client.sh
The `bria_call` function, implemented in the unaudited `bria_client.sh`, accepts raw string arguments for JSON fields and local file paths. This design creates a high risk of command injection if arguments are not properly sanitized, and a significant data exfiltration risk by reading arbitrary local files and sending their base64 encoded content to the Bria API.
RESULT=$(bria_call /v2/image/generate "" '"prompt": "your description"...') RESULT=$(bria_call /v2/image/edit/remove_background "/path/to/local/image.png")
The skill stores `access_token` and `refresh_token` in plain text within `~/.bria/credentials`. While intended functionality, this creates a persistent target for attackers, as these credentials could be easily exfiltrated or misused if the agent's environment is compromised.
printf 'access_token=%s\nrefresh_token=%s\n' "$BRIA_ACCESS_TOKEN" "$REFRESH_TOKEN" > "$HOME/.bria/credentials"
[](https://mondoo.com/ai-agent-security/skills/clawhub/galbria/bria-ai)<a href="https://mondoo.com/ai-agent-security/skills/clawhub/galbria/bria-ai"><img src="https://mondoo.com/ai-agent-security/api/badge/clawhub/galbria/bria-ai.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/clawhub/galbria/bria-ai.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.