markitdown
Warn
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill processes untrusted external data (PDFs, images, websites, and YouTube transcripts) and converts them to Markdown for the agent's context. This creates a surface for indirect prompt injection where malicious instructions hidden in these files could influence the agent's actions.
- Ingestion points:
markitdown.convert()calls inscripts/batch_convert.py,scripts/convert_literature.py, andscripts/convert_with_ai.py. - Boundary markers: Extracted content is written to Markdown files without explicit boundary delimiters or instructions for the agent to ignore embedded commands.
- Capability inventory: The agent has access to
Read,Write,Edit, andBashtools. - Sanitization: No specific filtering or sanitization of the extracted text content is performed before it is presented to the agent.
- [COMMAND_EXECUTION]: The skill utilizes the
Bashtool to install system dependencies (such as Tesseract and Poppler) and execute Python scripts. The provided scripts also useThreadPoolExecutorfor parallel processing of conversion tasks. - [REMOTE_CODE_EXECUTION]: The skill documentation describes and supports a plugin system that allows for the discovery and loading of 3rd-party code at runtime via Python entry points, which can be used to extend functionality but increases the execution surface.
Audit Metadata