local-ocr
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runto call external utilities likeocrmypdf,tesseract, andpdftotext. All commands are executed using argument lists, which effectively prevents shell injection vulnerabilities. The setup script also usessudoto execute package management commands for system dependencies.- [EXTERNAL_DOWNLOADS]: Thescripts/setup.shscript downloads and installs essential system-level dependencies (tesseract-ocr, ocrmypdf, etc.) from official package repositories. These are well-known, trusted sources and are necessary for the skill's primary function.- [PROMPT_INJECTION]: The skill represents a surface for indirect prompt injection as it ingests untrusted data (scanned documents or images) and extracts text for the agent's use. - Ingestion points:
scripts/ocr.pyreads user-supplied image and PDF files via thepdf,text, andbatchcommands. - Boundary markers: No explicit markers or delimiters are added to the extracted text output.
- Capability inventory: The skill has the ability to run subprocesses (OCR tools) and delete files (
pathlib.Path.unlink) when batch processing images into PDFs. - Sanitization: Employs
Path.resolve()for path safety and list-based command construction to prevent shell exploitation.
Audit Metadata