xparse-parse

Pass

Audited by Gen Agent Trust Hub on Apr 10, 2026

Risk Level: SAFEREMOTE_CODE_EXECUTIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The installation process described in SKILL.md uses shell pipe patterns to download and execute scripts directly from the vendor's infrastructure (https://dllf.intsig.net/download/2026/Solution/xparse-cli/install.sh and install.ps1). While these are vendor-provided resources for the xparse-cli tool, the pattern of executing remote code via shell pipes is a noted security practice.- [PROMPT_INJECTION]: The skill processes untrusted document content (PDFs, Office files, images) and converts it into Markdown/JSON for agent consumption, creating a surface for indirect prompt injection. 1. Ingestion points: Files provided by the user are processed via the xparse-cli parse command as specified in SKILL.md. 2. Boundary markers: The instructions do not define clear delimiters or 'ignore embedded instructions' warnings for the parsed output, allowing document content to mix with the system context. 3. Capability inventory: The skill uses xparse-cli for file parsing and allows the agent to execute shell commands to manage files and configurations. 4. Sanitization: There is no evidence of content sanitization or validation of the text extracted from documents before it is presented to the agent.- [COMMAND_EXECUTION]: The skill operates by executing shell commands via the xparse-cli binary. It instructs the agent to dynamically construct these commands using user-supplied parameters such as file paths and passwords, which requires careful handling to ensure arguments are treated as data rather than commands.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 10, 2026, 02:34 PM