latex-document-skill
Warn
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [PRIVILEGE_ESCALATION]: The script
scripts/install_deps.shusessudoto install system-level dependencies across multiple package managers (apt, dnf, pacman, etc.). This is also utilized insetup.shandscripts/latex_diff.shto ensure necessary tools likelatexdiffare present. - [EXTERNAL_DOWNLOADS]: The skill performs runtime downloads from well-known registries.
scripts/mermaid_to_image.shusesnpxto fetch and run@mermaid-js/mermaid-cli. Python scripts such asmail_merge.py,generate_chart.py, andcsv_to_latex.pycontain logic to automatically install missing dependencies usingpipat execution time. - [COMMAND_EXECUTION]: Extensive use of shell commands and
subprocesscalls exists to bridge LaTeX compilers (pdflatex,xelatex), document converters (pandoc), and PDF utilities (qpdf,poppler-utils). This is standard for the skill's purpose but involves executing complex command lines with user-controllable arguments. - [DYNAMIC_EXECUTION]: Several Python scripts utilize
__import__to dynamically load modules after ensuring their presence through the automated installation logic. - [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted input from external PDF, TeX, and CSV files.
SKILL.mdcorrectly identifies this risk, instructing the agent to treat such content as untrusted and avoid executing embedded macros or scripts found within documents. This capability, combined with system-level access, constitutes a surface for indirect injection attacks.
Audit Metadata