batch-convert
Pass
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill invokes external binaries such as
pandoc,marp, andsofficeviasubprocess.runto perform conversions. While shell injection is avoided by passing arguments as a list, the use of user-controlled file paths can expose the system to argument injection if filenames contain specific command flags. - [PROMPT_INJECTION]: The skill processes untrusted document content (PDF, HTML, MD) which presents an indirect prompt injection surface. Evidence Chain: 1. Ingestion points: Document content is read from
input_pathusing libraries likemarkitdownandpdf2docx. 2. Boundary markers: No delimiters or 'ignore' instructions are used when processing external file content. 3. Capability inventory: The skill utilizessubprocess.runfor executing CLI tools andopen().write()for local file creation. 4. Sanitization: No content sanitization or validation is performed on the ingested document data beyond simple file extension checks.
Audit Metadata