latex-document

Warn

Audited by Gen Agent Trust Hub on Apr 25, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The compile_latex.sh script is documented to automatically install system-level dependencies such as texlive and poppler-utils if they are not present, which involves executing package manager commands and potentially requires elevated privileges.\n- [COMMAND_EXECUTION]: The skill makes extensive use of bash scripts to wrap complex command-line utilities like pandoc, qpdf, latexmk, and pdftoppm for document processing and conversion.\n- [COMMAND_EXECUTION]: The skill performs dynamic code execution by compiling user-provided or generated LaTeX code using engines such as pdflatex, xelatex, and lualatex.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. Ingestion points: Reads content from external PDFs, scanned images, CSV, and JSON data sources. Boundary markers: None explicitly documented. Capability inventory: Includes command execution, file system access, and network requests. Sanitization: No evidence of input validation or sanitization before processing external data or using it in Jinja2 templates via mail_merge.py.\n- [EXTERNAL_DOWNLOADS]: The fetch_bibtex.sh script performs network operations to doi.org to retrieve bibliography metadata. This is a well-known academic service.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 25, 2026, 02:37 AM