Pass
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (LOW): The skill processes untrusted PDF data which serves as a potential vector for indirect prompt injection attacks (Category 8).
- Ingestion points: Multiple scripts, including
extract_form_field_info.py,extract_form_structure.py, andfill_fillable_fields.py, ingest data from external PDF files usingpypdf.PdfReaderandpdfplumber.open. - Boundary markers: Absent. There are no delimiters or explicit instructions to the agent to ignore instructions embedded within the PDF content during extraction.
- Capability inventory: The skill includes extensive capabilities for file modification, form filling, and OCR, as well as documentation for executing powerful command-line PDF utilities.
- Sanitization: Content extracted from PDF files is not sanitized before being returned to the agent or written to other files.
- [Dynamic Execution] (LOW): The script
scripts/fill_fillable_fields.pyutilizes dynamic monkeypatching to modify the behavior of an external library at runtime. - Evidence: The function
monkeypatch_pydpf_methodoverwritesDictionaryObject.get_inheritedwithin thepypdflibrary to resolve a specific field inheritance issue. This is a legitimate compatibility fix but uses a dynamic code modification pattern. - [Command Execution] (SAFE):
SKILL.mdprovides instructions for using CLI tools such asqpdf,pdftk, andpdftotext. These are provided as user documentation and are not executed automatically or unsafely by the Python scripts.
Audit Metadata