screen-design-doc
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill downloads the
pdf-parsepackage from the public NPM registry via thenpm installcommand during the PDF extraction step. - [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute shell commands for installing dependencies and running a Node.js script (extract_pdf_text.js) to process user files. - [REMOTE_CODE_EXECUTION]: A combination of downloading external packages from NPM and executing a local script that utilizes those dependencies constitutes a remote code execution risk, as the fetched code is not from a trusted vendor.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted text from external documents (PDF, TXT, MD) and uses it to generate output without sanitization or protective boundary markers.
- Ingestion points: Untrusted data is read from user-specified file paths and extracted via a Node.js script in
Step 2andStep 3of the skill flow. - Boundary markers: The instructions do not define delimiters or explicit "ignore embedded instructions" warnings for the processed text.
- Capability inventory: The skill utilizes
Bash,Read, andWritetools to modify the workspace and execute scripts. - Sanitization: No validation or filtering is applied to the extracted text before it is presented to the LLM for analysis and document generation.
Audit Metadata