summarize
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. It fetches content from untrusted external URLs or local files and includes it in a prompt for summarization.
- Ingestion points: The script
to-markdown.mjsaccepts arbitrary URLs and local file paths via command-line arguments. - Boundary markers: The summarization prompt uses simple text delimiters (
--- BEGIN DOCUMENT (Markdown) ---) which can be easily bypassed or spoofed by malicious instructions embedded in the source document. - Capability inventory: The skill has the ability to read files, perform network requests (via
markitdown), write to the temporary file system, and execute thepiCLI tool. - Sanitization: Converted Markdown content and user-supplied prompts are not sanitized or escaped before being interpolated into the summarization prompt.
- [EXTERNAL_DOWNLOADS]: The skill uses
uvxto dynamically install and run themarkitdownpackage. - Evidence: The function
runMarkitdowninto-markdown.mjsexecutesuvx markitdown, which fetches the package from a public registry (PyPI) at runtime if not already available. - [COMMAND_EXECUTION]: The skill executes external CLI tools to perform its core functionality.
- Evidence: Found in
to-markdown.mjsusingspawnSyncto invokeuvxandpi. While the implementation uses argument arrays, it grants the agent the capability to run these specific binaries with input derived from external sources.
Audit Metadata