pdf-design

Pass

Audited by Gen Agent Trust Hub on Feb 14, 2026

Risk Level: LOWPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
  • [Indirect Prompt Injection] (LOW): The skill facilitates the processing of external content (PDF files), which represents a vulnerability surface for indirect prompt injection. \n
  • Ingestion points: File reading via PdfReader and PdfMerger in SKILL.md.\n
  • Boundary markers: None identified in the provided code examples.\n
  • Capability inventory: Local file system write access (open("filename", "wb")) and execution of document utilities.\n
  • Sanitization: No specific input sanitization or validation logic is demonstrated for external PDF content.\n- [COMMAND_EXECUTION] (LOW): The skill provides instructions for utilizing standard command-line utilities such as pdftotext, qpdf, and pdfinfo. These are appropriate for the skill's stated purpose and do not involve privileged operations.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 14, 2026, 01:41 AM