Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill's primary function involves processing untrusted external data (PDF files) which serves as a major attack surface.
- Ingestion points: PDF content and form field metadata are ingested via
pypdfinextract_form_field_info.pyandpdfplumberinSKILL.mdexamples. - Boundary markers: Absent. The instructions in
forms.mddo not require the agent to use delimiters or ignore instructions found within the PDF text. - Capability inventory: The skill allows for significant side effects, including writing new PDF files (
PdfWriter.write), generating images (Image.save), and executing various shell commands (qpdf,pdftotext,pdftk) as documented inSKILL.md. - Sanitization: None. Text and metadata extracted directly from the PDF are used to build JSON structures (
fields.json) that subsequent scripts and the agent rely on for decision-making. - Dynamic Execution (MEDIUM): The script
scripts/fill_fillable_fields.pyperforms runtime monkeypatching of thepypdflibrary. - Evidence: It overrides
pypdf.generic.DictionaryObject.get_inheritedwith a custom implementation to bypass a specific library bug. Modifying third-party library behavior at runtime is a risky practice that can lead to unexpected security states or stability issues. - Command Execution (LOW): The skill workflow depends on the agent executing multiple local Python scripts and system utilities.
- Evidence:
SKILL.mdandforms.mdprovide explicit instructions for the agent to runconvert_pdf_to_images.py,extract_form_field_info.py, andfill_fillable_fields.py. While necessary for functionality, these scripts operate on data derived from untrusted PDF inputs.
Recommendations
- AI detected serious security threats
Audit Metadata