pdf-creator
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill processes untrusted markdown content and renders it into a PDF without sanitization. * Evidence Chain: 1. Ingestion points:
scripts/md_to_pdf.py(reading file content) andscripts/batch_convert.py(processing command-line file arguments). 2. Boundary markers: Absent. 3. Capability inventory: Local file write (PDF generation) and network/file resource fetching via the WeasyPrint engine. 4. Sanitization: None. Themarkdownlibrary andweasyprintrenderer do not restrict raw HTML or external resource loading by default, allowing SSRF or LFI. - [Data Exfiltration] (HIGH): Maliciously crafted markdown can leverage the PDF renderer to embed sensitive local files or internal network data directly into the output document.
- [Command Execution] (LOW): The skill requires manual setup of environment variables like
DYLD_LIBRARY_PATHand usesuv run. While necessary for the stated purpose on certain platforms, environment variable overrides can be a vector for library hijacking.
Recommendations
- AI detected serious security threats
Audit Metadata