paper-reader
Pass
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted data from external academic papers and web pages.
- Ingestion points: Untrusted data enters the agent context through
WebFetchof arXiv HTML and project pages, as well asReadoperations on PDF files and Zotero database entries. - Boundary markers: The prompt construction in
paper_daemon.pylacks explicit delimiters or instructions to ignore embedded commands within the interpolated paper metadata. - Capability inventory: The skill possesses extensive capabilities across its scripts, including
Bash(command execution),Write/Edit(file system modification),WebFetch/WebSearch(network access), and automatedGitoperations. - Sanitization: No explicit sanitization or filtering is performed on paper titles or content before they are interpolated into the system prompts.
- [COMMAND_EXECUTION]: The
paper_daemon.pyscript usessubprocess.runto execute theclaudeCLI and other system tools likecp. While it avoids usingshell=True, it interpolates external data (like paper titles) into the command arguments, which represents a potential attack surface if the CLI tool itself is vulnerable to specific argument patterns. - [EXTERNAL_DOWNLOADS]: The skill frequently performs network operations to fetch paper content and images from academic sources (e.g.,
arxiv.org). While these are well-known academic services, the automated nature of the downloads could be leveraged to interact with malicious URLs if they are embedded in paper metadata.
Audit Metadata