Pass
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) because it ingests data from external PDF files and processes it without implementing protective delimiters or sanitization. This could allow an attacker to embed malicious instructions within a PDF to hijack the agent's behavior.
- Ingestion points:
SKILL.md(using pdfplumber),scripts/extract_form_structure.py, andscripts/extract_form_field_info.py. - Boundary markers: Absent; extracted text is not wrapped in any markers to distinguish it from system instructions.
- Capability inventory: The skill has the ability to execute shell commands via
bash, write files to the local system, and usepython_replfor data processing. - Sanitization: No sanitization or filtering is performed on the content extracted from PDF documents.
- [COMMAND_EXECUTION]: The skill uses the
bashtool to execute its own Python scripts for core tasks like Markdown-to-PDF conversion, image rendering, and form filling. - [EXTERNAL_DOWNLOADS]: The skill instructions provide the agent with commands to install legitimate dependencies such as
reportlabfrom the official Python package registry if they are missing from the environment.
Audit Metadata