reportlab
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (MEDIUM): The scripts
assets/invoice_template.pyandscripts/quick_document.pyaccept external strings (e.g., client info, notes, paragraph content) and insert them directly into ReportLabParagraphobjects without sanitization. - Ingestion points: Function arguments in
assets/invoice_template.py(company_info, client_info, notes) andscripts/quick_document.py(content_blocks). - Boundary markers: None present in the functional code to delimit untrusted input from layout instructions.
- Capability inventory: The skill can write files to the local disk (
doc.build) and read local image files via theImageflowable or<img src="..."/>tags. - Sanitization: Absent in the executable scripts. While
references/text_and_fonts.mdmentions the need to escape HTML for user content, the provided code does not implement this. An attacker could provide input containing tags like<img src="/etc/passwd"/>to probe the filesystem or<link href="http://malicious.com"/>for phishing. - Data Exposure (LOW): The
create_invoicefunction inassets/invoice_template.pytakes alogo_pathargument that is passed directly to theImageflowable. If an agent allows an untrusted user to control this path, it could be used to verify the existence of sensitive local files or include them in generated documents if they are valid image formats.
Audit Metadata