Fail
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is designed to ingest untrusted PDF documents, extract their content (text, fields, and images), and present this data to the agent to guide form-filling tasks as described in
forms.md. - Ingestion points:
scripts/extract_form_field_info.py(reads PDF fields/metadata) andscripts/convert_pdf_to_images.py(renders PDF pages for visual analysis). - Boundary markers: Absent. There are no delimiters or instructions to the agent to ignore potentially malicious text embedded within the processed PDF data.
- Capability inventory: The skill has extensive file-write capabilities via
pypdf,reportlab, andPIL, and it executes subprocesses for PDF command-line utilities. - Sanitization: Absent. Data from the PDF is processed and used directly in decision-making logic.
- [Dynamic Execution] (MEDIUM): The script
scripts/fill_fillable_fields.pycontains amonkeypatch_pydpf_method()function that modifies thepypdf.generic.DictionaryObject.get_inheritedmethod at runtime. While intended as a bug workaround, runtime patching of library internals is a high-risk pattern that can lead to unstable or insecure behavior if applied incorrectly. - [Command Execution] (LOW): The skill documentation and
forms.mdfrequently direct the agent to execute local Python scripts and standard PDF utilities likeqpdf,pdftotext, andpdftk. While these are used for their intended PDF processing purposes, they represent a significant local execution surface.
Recommendations
- AI detected serious security threats
Audit Metadata