pdf-creator

Warn

Audited by Gen Agent Trust Hub on Apr 3, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The script scripts/md_to_pdf.py dynamically modifies the DYLD_LIBRARY_PATH environment variable on macOS to include /opt/homebrew/lib. This is a form of dynamic library path manipulation that can influence which shared libraries are loaded at runtime.
  • [COMMAND_EXECUTION]: Multiple scripts execute shell commands via subprocess.run():
  • scripts/md_to_pdf.py executes pandoc to convert markdown to HTML.
  • scripts/tests/test_list_rendering.py executes uv run and pdftotext to verify output.
  • [COMMAND_EXECUTION]: scripts/batch_convert.py performs dynamic path injection by inserting its parent directory into sys.path at index 0, affecting module resolution logic.
  • [PROMPT_INJECTION]: The skill provides an indirect prompt injection surface as it ingests untrusted markdown data from files and processes them using a system-level tool (pandoc).
  • Ingestion points: File paths provided via CLI arguments in scripts/md_to_pdf.py and scripts/batch_convert.py.
  • Boundary markers: Absent; the content is read and passed directly to the conversion pipeline.
  • Capability inventory: Subprocess execution of pandoc and file-writing capabilities to the local filesystem.
  • Sanitization: None; the script reads raw file content and passes it to the input parameter of subprocess.run() without validation or escaping.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 3, 2026, 10:04 PM