reaction-data-extraction

Pass

Audited by Gen Agent Trust Hub on Mar 30, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The main script scripts/reaction_data_extraction.py invokes the mineru command-line tool via subprocess.run. The command is constructed using a list of arguments, which is a safe practice that mitigates shell injection risks. \n- [EXTERNAL_DOWNLOADS]: The skill requires several standard Python libraries for PDF parsing and chemistry informatics, such as mineru, PyMuPDF, and rdkit, as listed in requirements.txt. These are legitimate dependencies for the skill's technical domain. \n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection attack surface by processing untrusted PDF documents. Evidence: 1. Ingestion points: PDF files processed via mineru in scripts/reaction_data_extraction.py. 2. Boundary markers: Absent in the extracted Markdown text. 3. Capability inventory: Subprocess execution and file system write access. 4. Sanitization: No content validation or filtering is applied to the extracted Markdown data before it is handled by the agent.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 30, 2026, 12:51 AM