pdf-design
Pass
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: LOWPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (LOW): The skill facilitates the processing of external content (PDF files), which represents a vulnerability surface for indirect prompt injection. \n
- Ingestion points: File reading via
PdfReaderandPdfMergerin SKILL.md.\n - Boundary markers: None identified in the provided code examples.\n
- Capability inventory: Local file system write access (
open("filename", "wb")) and execution of document utilities.\n - Sanitization: No specific input sanitization or validation logic is demonstrated for external PDF content.\n- [COMMAND_EXECUTION] (LOW): The skill provides instructions for utilizing standard command-line utilities such as
pdftotext,qpdf, andpdfinfo. These are appropriate for the skill's stated purpose and do not involve privileged operations.
Audit Metadata