literature-review
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The
scripts/generate_pdf.pyscript passes user-provided file paths directly tosubprocess.runwhen callingpandoc. Evidence: The variablesmarkdown_file,output_pdf, andtemplateare appended to the command list without validation or sanitization. Whileos.path.existsis checked for some inputs, an attacker can create files with names that act as command flags (e.g.,--lua-filter=exploit.lua) to execute arbitrary code through Pandoc's filtering system. - [EXTERNAL_DOWNLOADS] (SAFE): The
scripts/verify_citations.pyscript performs network operations to fetch metadata. Details: It communicates withdoi.organdapi.crossref.orgusing therequestslibrary. These are reputable sources necessary for the skill's intended functionality. - [PROMPT_INJECTION] (LOW): The skill ingests untrusted data from external APIs and JSON files and interpolates it into markdown output without sanitization, exposing it to indirect prompt injection. Ingestion points:
scripts/search_databases.py(JSON file input) andscripts/verify_citations.py(CrossRef API response). Boundary markers: No delimiters or warnings are used in the generated markdown output to separate untrusted content from instructions. Capability inventory: The skill possesses the ability to execute shell commands (viapandoc) and perform network requests. Sanitization: None detected; fields such as titles and abstracts are used directly.
Audit Metadata