Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is designed to process untrusted PDF documents, creating a significant surface for indirect prompt injection (Category 8). * Ingestion points: PDFs are ingested via
pypdfinscripts/extract_form_field_info.pyandscripts/check_fillable_fields.py, and viapdfplumberandpytesseractinSKILL.mdexamples. * Boundary markers: No markers or delimiters are defined informs.mdto isolate extracted PDF content from agent instructions. * Capability inventory: The skill allows writing files (PdfWriter.write), saving images (image.save), and executing Python scripts. * Sanitization: There is no evidence of sanitization for text extracted from PDF metadata, OCR, or form fields. - [Dynamic Execution] (MEDIUM):
scripts/fill_fillable_fields.pycontains amonkeypatch_pydpf_methodfunction that modifiespypdf.generic.DictionaryObject.get_inheritedat runtime. This dynamic modification of library behavior (Category 10) is risky and can lead to unexpected execution paths. - [Command Execution] (LOW): The agent is instructed to run shell commands (e.g.,
qpdf,pdftotext,pdftk) and internal scripts using filenames as arguments. Maliciously crafted filenames in untrusted data could lead to command injection if not handled securely by the agent. - [External Downloads] (LOW):
SKILL.mdrecommends installing packages such aspypdf,pdfplumber,pandas,reportlab, andpytesseract. These are trusted libraries, so the download risk is categorized as LOW per [TRUST-SCOPE-RULE].
Recommendations
- AI detected serious security threats
Audit Metadata