novel-reader
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) because it ingest untrusted data from external text files (novels) and processes them to generate summaries and extract assets.
- Ingestion points: The
read_novel_segmentfunction inread_novel.pyreads content from a user-provided file path. - Boundary markers: The skill lacks explicit boundary markers or instructions to the agent to ignore embedded commands within the novel text.
- Capability inventory: The skill allows reading local files via
read_novel.pyand instructs the agent to write several files (大纲.txt,读取进度.txt, and multiple character/item/scene files) based on the analyzed content. - Sanitization: No sanitization or filtering of the novel's text is performed before it is passed to the agent for analysis.
- [RESOURCE_EXHAUSTION]: The script
read_novel.pyreads the entire content of the file into memory usingf.read()in bothget_novel_infoandread_novel_segmentfunctions. This approach is inefficient for a tool designed for 'long text novels' and could lead to memory exhaustion (Denial of Service) if executed on exceptionally large files.
Audit Metadata