reaction-data-extraction
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The main script
scripts/reaction_data_extraction.pyinvokes theminerucommand-line tool viasubprocess.run. The command is constructed using a list of arguments, which is a safe practice that mitigates shell injection risks. \n- [EXTERNAL_DOWNLOADS]: The skill requires several standard Python libraries for PDF parsing and chemistry informatics, such asmineru,PyMuPDF, andrdkit, as listed inrequirements.txt. These are legitimate dependencies for the skill's technical domain. \n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection attack surface by processing untrusted PDF documents. Evidence: 1. Ingestion points: PDF files processed viamineruinscripts/reaction_data_extraction.py. 2. Boundary markers: Absent in the extracted Markdown text. 3. Capability inventory: Subprocess execution and file system write access. 4. Sanitization: No content validation or filtering is applied to the extracted Markdown data before it is handled by the agent.
Audit Metadata