PDF Generator
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (LOW): The skill processes untrusted Markdown and HTML data to generate PDF files without sanitization. This presents an attack surface where a malicious document could attempt to execute scripts or access internal resources during the rendering process.
- Ingestion points: The
markdownToPdffunction reads content from a file path (mdPath), andgenerateReportprocesses adataobject. - Boundary markers: None; the skill lacks specific delimiters or instructions to ignore embedded commands in the source documents.
- Capability inventory: Uses
fs.readFileSyncfor file access,fs.createWriteStreamfor file writing, andpuppeteer.launch()to start a browser process. - Sanitization: The skill uses the
markedlibrary to parse Markdown into HTML and directly passes the result topage.setContent()without filtering potentially malicious HTML tags or scripts. - [Command Execution] (LOW): The implementation relies on
puppeteerto launch a headless browser. While necessary for the primary purpose of high-fidelity PDF rendering, this increases the attack surface if the environment is not properly sandboxed, as the browser can be directed to load local files or internal network metadata endpoints.
Audit Metadata