lunwen

Pass

Audited by Gen Agent Trust Hub on Apr 6, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The script 'tools/capture_thesis_screenshots.py' uses subprocess.run to execute npm commands for installing dependencies and managing Playwright browsers. Additionally, 'tools/render_mermaid.py' uses subprocess.run to invoke npx for rendering Mermaid diagrams. These executions are integral to the skill's documented workflow for thesis asset generation.
  • [EXTERNAL_DOWNLOADS]: The skill facilitates the download of Node.js packages and browser binaries through the npm registry as part of its automated setup in 'tools/capture_thesis_screenshots.py'. These downloads originate from well-known service providers and are used for the skill's intended browser automation functionality.
  • [PROMPT_INJECTION]: The skill is designed to ingest and process external content from user-provided thesis templates, sample papers (in DOCX and PDF formats), and project source code. This creates a surface for indirect prompt injection where instructions embedded in these files could potentially influence the agent's behavior during the thesis generation process.
  • Ingestion points: External data is ingested via 'tools/analyze_docx.py', 'tools/analyze_sample_pdf.py', and general file-reading logic in various prompts.
  • Boundary markers: The prompts suggest using delimiters to separate instructions from data, though they do not provide absolute isolation against adversarial content.
  • Capability inventory: The skill possesses capabilities for file system modification and shell command execution via its bundled Python and Node.js tools.
  • Sanitization: Content is subjected to formatting-related cleanup, but the skill lacks specific security sanitizers for preventing instruction injection from processed data.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 6, 2026, 11:10 AM