Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it extracts and interprets content (text and images) from untrusted PDF files to determine form layouts.
- Ingestion points: PDF content is ingested and processed in
scripts/extract_form_field_info.py,scripts/extract_form_structure.py, andscripts/convert_pdf_to_images.py. - Boundary markers: There are no explicit delimiters or safety instructions provided to the agent to distinguish between its own logic and instructions that might be embedded in the PDF data.
- Capability inventory: The skill utilizes subprocesses to execute system commands and has the ability to read/write files.
- Sanitization: No sanitization, filtering, or validation is performed on the extracted text before it is presented to the agent for analysis.
- [COMMAND_EXECUTION]: The skill relies on several external command-line utilities for document manipulation and image processing.
- Evidence:
SKILL.mdandforms.mdinstruct the agent to use tools such asqpdf,pdftotext,pdftk, andmagick(ImageMagick) to merge, split, crop, and OCR PDF files. - [REMOTE_CODE_EXECUTION]: The skill employs dynamic code modification techniques to adjust the behavior of its dependencies.
- Evidence:
scripts/fill_fillable_fields.pycontains amonkeypatch_pydpf_methodfunction that redefines theget_inheritedmethod of thepypdf.generic.DictionaryObjectclass at runtime.
Audit Metadata