mineru-extract

Warn

Audited by Snyk on Feb 21, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill explicitly accepts arbitrary public URLs (see SKILL.md "Parse URL(s) → Markdown" and scripts/mineru_parse_documents.py --file-sources and scripts/mineru_extract.py "source" arg), sends them to MinerU, downloads the result zip and extracts/optionally emits the Markdown/JSON to stdout, so untrusted, user-generated web content is fetched and returned for the agent to read and act on, allowing indirect prompt injection.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 21, 2026, 05:52 AM