silicon-paddle-ocr
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION] (HIGH): Vulnerable to Indirect Prompt Injection (Category 8). The skill extracts text from images which are often sourced from untrusted external environments.
- Ingestion points:
scripts/ocr_skill.pyreads image files from disk via theimagesargument. - Boundary markers: Absent. The script does not wrap the model output in delimiters or provide the agent with instructions to ignore embedded commands within the OCR results.
- Capability inventory: The skill has the capability to perform network requests (to the SiliconFlow API), read local files, and write output to the filesystem via the
--outputflag. - Sanitization: None. The recognized text is returned directly to the agent's context, which could lead to the agent following malicious instructions embedded in an image.
- [DATA_EXFILTRATION] (HIGH): The skill reads local file content, converts it to Base64, and transmits it to an external, non-whitelisted API endpoint (
api.siliconflow.cn). - Evidence: In
scripts/ocr_skill.py, theimage_to_base64function reads any file path provided, andocr_imagesends this data to the SiliconFlow API. - Risk: Because the skill accepts arbitrary file paths and glob patterns without validation that the files are actually images, an attacker could trick an agent into 'OCR-ing' sensitive files (e.g.,
.env, SSH keys), effectively exfiltrating their contents to the third-party API provider. - [EXTERNAL_DOWNLOADS] (LOW): The skill depends on the
openaiPython package as specified inmetadata.jsonandscripts/ocr_skill.py. This is a standard dependency but requires external installation.
Recommendations
- AI detected serious security threats
Audit Metadata