Warn
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
pdftoppmsystem utility to render PDF pages into images, which involves executing shell commands with variable inputs. - [COMMAND_EXECUTION]: The instructions command the use of
sudo apt-getto install system packages, which grants administrative privileges to the installation process. - [EXTERNAL_DOWNLOADS]: The skill downloads and installs several Python libraries (
reportlab,pdfplumber,pypdf) and system tools (poppler-utils) from well-known public repositories. - [PROMPT_INJECTION]: The skill processes content from PDF files which can serve as a vector for indirect prompt injection attacks.
- Ingestion points: PDF content is read and rendered using
pdfplumber,pypdf, andpdftoppmas specified inSKILL.md. - Boundary markers: There are no boundary markers or instructions to ignore embedded commands within the PDF data.
- Capability inventory: The skill can execute shell commands (
pdftoppm) and install new software viapipandapt-get. - Sanitization: No sanitization or validation of the extracted text or rendered content is performed before processing.
Audit Metadata