Pass
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (LOW): The skill processes untrusted PDF documents, creating a surface for indirect prompt injection attacks.
- Ingestion points: PDF data is ingested and parsed in multiple scripts including
extract_form_field_info.py,check_fillable_fields.py, andconvert_pdf_to_images.pyusing thepypdfandpdf2imagelibraries. - Boundary markers: The skill instructions do not provide explicit boundary markers or directions for the agent to ignore or isolate instructions potentially contained within the processed PDF content.
- Capability inventory: The skill includes extensive capabilities for reading, writing, and annotating PDF files. The
SKILL.mdandforms.mdfiles provide several command-line examples and Python scripts for the agent to execute. - Sanitization: There is no evidence of sanitization or filtering of extracted PDF text before it is presented to the agent's context.
- [Dynamic Execution] (LOW): The script
scripts/fill_fillable_fields.pyperforms dynamic logic modification on an external library. - Evidence: The function
monkeypatch_pydpf_methodoverridespypdf.generic.DictionaryObject.get_inheritedat runtime. While this is implemented as a workaround for a specific bug inpypdfv5.7.0, dynamic patching is a security-relevant pattern. The severity is lowered as this behavior is directly associated with the skill's primary purpose of form filling.
Audit Metadata