html-prototype
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill performs an automated installation of the
pdf-parselibrary from the npm registry usingnpm installduring the environment setup phase. - [COMMAND_EXECUTION]: Executes a local Node.js script (
extract_pdf_text.js) via the command line to process user-provided PDF files and extract their text content. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted input to generate executable code.
- Ingestion points: Reads content from user-provided
.pdf,.txt, and.mdfiles in Step 1 and Step 2 ofSKILL.md. - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are used when passing the extracted text to the code generation phase.
- Capability inventory: The skill uses the
Writetool to create.htmland.jsfiles containing executable scripts (Step 4 and Step 3.5). - Sanitization: There is no evidence of sanitization or escaping of the input text before it is interpolated into the HTML/JS generation logic, which could allow an attacker to inject malicious scripts into the resulting prototype.
Audit Metadata