sec-edgar-pipeline
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [Dynamic Execution] (MEDIUM): The workflow utilizes
edgar-analyzer generate-codefollowed byedgar-analyzer run-extraction. This pattern indicates that executable code is synthesized at runtime based on project patterns and then executed to perform data extraction. This creates a risk if the generation logic is influenced by malicious patterns in the input data. - [Indirect Prompt Injection] (LOW): The skill ingests data from external SEC EDGAR filings.
- Ingestion points: SEC filings are fetched via
fetch_apple_def14a.pyand other discovery scripts. - Boundary markers: No specific delimiters or safety instructions are mentioned to prevent the agent from obeying instructions hidden within financial filings.
- Capability inventory: The skill possesses network access (SEC API, OpenRouter, Jina) and file writing capabilities (CSV/JSON output).
- Sanitization: No sanitization of filing content is described before it is processed by the code generation or extraction logic.
- [Data Exposure] (LOW): The
setupcommand requests sensitive credentials includingOPENROUTER_API_KEYandJINA_API_KEY. While the skill uses a setup wizard rather than hardcoding keys, the handling of these keys by a non-standard CLI tool (edgar-analyzer) from an untrusted repository should be monitored for exfiltration. - [External Downloads] (LOW): The skill identifies and downloads filings from the SEC EDGAR system. While the source is a government entity, the content of these downloads is untrusted and serves as the primary input for the extraction logic.
Audit Metadata