pdf-processing-anthropic
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: Deceptive metadata impersonating a trusted organization.
- Evidence: The metadata in
SKILL.mdandLICENSE.txtidentifies the author as "Anthropic" and describes a proprietary license, which contradicts the internal author identity "lawvable". This impersonation can lead to a misjudgment of the skill's origin and safety. - [PROMPT_INJECTION]: Potential for indirect prompt injection via untrusted PDF data ingestion.
- Ingestion points:
scripts/extract_form_field_info.pyandscripts/convert_pdf_to_images.pyprocess external PDF files to extract form metadata and images. - Boundary markers: The skill lacks explicit boundary markers or instructions for the agent to ignore potentially malicious commands embedded in PDF text or metadata.
- Capability inventory: The skill utilizes subprocesses for CLI tools and file writing capabilities through
pypdf,Pillow, andpdf2image. - Sanitization: No sanitization or filtering of extracted PDF content is performed.
- [COMMAND_EXECUTION]: Instructions and examples for executing external command-line utilities.
- Evidence:
SKILL.mdandREFERENCE.mdcontain instructions for running tools likeqpdf,pdftotext,pdftk, andpdftoppmwhich execute as shell commands. - [EXTERNAL_DOWNLOADS]: Dependency on various well-known third-party Python and Node.js libraries.
- Evidence: The skill requires several standard packages including
pypdf,pdfplumber,reportlab,pytesseract,pdf2image,pdf-lib, andpdfjs-dist.
Audit Metadata