当用户希望 OpenClaw 通过 Gemini 网页版完成通用浏览器交互时使用,包括登录、续接或分叉 Gemini 线程、上传文件给 Gemini 分析、向 Gemini 提问、起草或总结内容,以及生成可下载图片。
Security Analysis
high confidenceThe skill's requirements and instructions align with its stated purpose (browser-driven Gemini web interactions); the included TOTP helper is consistent with the login automation described and no unexpected network endpoints or unrelated credentials are requested.
Skill claims browser-based Gemini interactions and only requires python3 plus an internal totp script and optional GEMINI_WEB_* credentials — all are reasonable and relevant to automated login, file upload, and download workflows described.
SKILL.md stays within the declared purpose (open Gemini site, reuse browser profile, upload user-provided files, download results). It does permit reading credentials from env vars and optionally reading a JSON file (examples reference ~/.secrets/gemini.json). This file-reading is expected for TOTP use but means the agent can be instructed to read local secret files if provided — users should avoid pointing it at unrelated secret stores.
No install spec; instruction-only with a small included Python script. Risk is low — nothing is downloaded from external URLs or written to system paths by an installer.
The skill does not require env vars by default but documents optional GEMINI_WEB_EMAIL, GEMINI_WEB_PASSWORD, GEMINI_WEB_TOTP_SECRET, GEMINI_WEB_TOTP_URI as credential sources. That is proportionate to automated login behavior, but these are sensitive values — only provide them when you trust the environment and the agent session.
always:false and normal autonomous invocation; the skill does not request persistent or cross-skill configuration changes. It writes downloads into a local ./output/gemini/ folder as part of normal operation, which is consistent with its stated function.
Guidance
This skill appears coherent: it is designed to control a hosted browser session for Gemini, optionally using credentials and a TOTP secret to automate login. Things to consider before installing: only provide GEMINI_WEB_* values if you trust the environment (these are sensitive); avoid pasting passwords/TOTP secrets into chat — use environment variables or a secure file the agent is explicitly permitted to read; the included scripts/totp.py is a local TOTP generator (no network calls) but can read a JSON file you point it to, so do not point it at unrelated secret stores. Verify you are comfortable with the agent accessing local files you upload and the output directory it will write to. If you need stricter control, keep autonomous invocation off for sessions that provide credentials or explicitly review the repository code yourself (homepage link) before use.
Latest Release
v0.1.5
补充 Gemini 登录、TOTP 与地区排查的实测经验
More by @etherstrings
Published by @etherstrings on ClawHub