skills/eigent-ai/eigent/pdf/Gen Agent Trust Hub

pdf

Pass

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted PDF data to extract text and structure which then informs subsequent agent actions.
  • Ingestion points: scripts/extract_form_field_info.py and scripts/extract_form_structure.py read external PDF content.
  • Boundary markers: No explicit delimiters or instructions to ignore embedded commands are used when processing extracted text.
  • Capability inventory: The agent has the ability to write files via scripts/fill_fillable_fields.py and scripts/fill_pdf_form_with_annotations.py.
  • Sanitization: No sanitization or validation of the extracted PDF text is performed before it is used by the agent.
  • [COMMAND_EXECUTION]: The skill's workflow depends on the execution of multiple Python scripts and external command-line utilities (e.g., qpdf, pdftotext, pdftk, and magick) to perform file transformations.
  • [DYNAMIC_EXECUTION]: The script scripts/fill_fillable_fields.py utilizes runtime monkeypatching of the pypdf library's DictionaryObject.get_inherited method to modify its behavior for specific PDF metadata handling.
  • [CREDENTIALS_UNSAFE]: SKILL.md includes a code example for PDF encryption that uses hardcoded literal strings ("userpassword", "ownerpassword") as secrets, which could lead to insecure practices if copied directly by a user.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 10, 2026, 09:49 AM