pdf-composer
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its processing of untrusted input.
- Ingestion points: The skill reads the entire content of a user-provided Markdown file in
src/index.tsand passes it to the rendering engine. - Boundary markers: No boundary markers or instructions are used to distinguish between user data and instructions during the rendering phase.
- Capability inventory: The skill utilizes
puppeteerinsrc/lib.tsto render HTML. Puppeteer is capable of executing JavaScript and making network requests (e.g., viawaitUntil: 'networkidle0'). - Sanitization: Markdown content is parsed by the
markedlibrary and directly embedded into an HTML template insrc/lib.tswithout sanitization, allowing for potential HTML/JavaScript injection within the browser instance. - [EXTERNAL_DOWNLOADS]: The skill uses dependencies that trigger the download of external executable binaries.
- Evidence: The
package.jsonandpackage-lock.jsonfiles includepuppeteerandphantomjs-prebuilt(viamarkdown-pdf). These packages are known to download browser binaries (Chromium and PhantomJS) during installation to perform document rendering. - [COMMAND_EXECUTION]: The skill executes a browser process with a significantly reduced security posture.
- Evidence: In
src/lib.ts, the browser is launched with the--no-sandboxand--disable-setuid-sandboxflags. These flags disable core security isolation features of the browser, increasing the risk if malicious content is processed.
Audit Metadata