latex-document
Warn
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The dependency installer in
scripts/install_deps.shutilizessudoto perform system-level package installations (e.g., TeX Live, Poppler). This grants the skill administrative access to the host environment.- [COMMAND_EXECUTION]: Thescripts/pdf_encrypt.shscript accepts user and owner passwords as command-line arguments, which exposes these credentials in the system's process list (ps) and shell history.- [EXTERNAL_DOWNLOADS]: Thescripts/plantuml_to_pdf.shscript fetches the PlantUML executable JAR from its official GitHub repository at runtime.- [EXTERNAL_DOWNLOADS]: Thescripts/mermaid_to_image.shscript usesnpxto download and execute the@mermaid-js/mermaid-clipackage from the npm registry.- [REMOTE_CODE_EXECUTION]: Documentation inreferences/beamer-guide.mdandreferences/visual-packages.mdsuggests using the-shell-escapeflag with LaTeX compilers to support certain features like syntax highlighting. This flag allows the LaTeX compiler to execute arbitrary shell commands, which poses a significant security risk when processing untrusted document content.- [PROMPT_INJECTION]: The PDF-to-LaTeX conversion pipeline described inreferences/pdf-conversion.mdprocesses document images using a vision model. This represents a surface for indirect prompt injection if the source documents contain malicious instructions embedded within the text images.
Audit Metadata