skills/garrytan/gstack/make-pdf/Gen Agent Trust Hub

make-pdf

Warn

Audited by Gen Agent Trust Hub on May 3, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill's preamble executes multiple local binaries (e.g., gstack-config, gstack-telemetry-log, gstack-brain-sync) located in ~/.claude/skills/gstack/bin/ to manage environment state and telemetry.
  • [DYNAMIC_EXECUTION]: The preamble uses eval and source with process substitution to execute the output of local helper binaries (gstack-slug, gstack-repo-mode), which is a technique for dynamic configuration loading.
  • [DATA_EXFILTRATION]: The skill includes an opt-in 'GBrain Sync' feature that synchronizes session memory and artifacts to a private GitHub repository. It also collects usage analytics (skill name, duration, and outcome) which are sent to a remote telemetry service.
  • [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted Markdown content which is then rendered into HTML and PDF, presenting an attack surface for indirect prompt injection.
  • Ingestion points: External Markdown files are read via fs.readFileSync in src/orchestrator.ts.
  • Boundary markers: No explicit boundary markers or 'ignore' instructions are used during the interpolation of Markdown content into the HTML template.
  • Capability inventory: The skill has the ability to execute shell commands via browse and pdftotext binaries and can open local files using system tools (open, xdg-open).
  • Sanitization: The skill implements a sanitizeUntrustedHtml function in src/render.ts which uses regular expressions to strip dangerous elements like , , and various event handler attributes from the HTML output.
  • [COMMAND_EXECUTION]: The orchestrator calls the browse binary (a Chromium daemon) for PDF generation and pdftotext for verifying the quality of the generated document.
Audit Metadata
Risk Level
MEDIUM
Analyzed
May 3, 2026, 02:25 PM