pdf-process-mineru
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
script/pdf_parser.pyusessubprocess.runto call theminerucommand-line tool. It passes arguments as a list, which is a secure practice that prevents shell injection vulnerabilities. - [EXTERNAL_DOWNLOADS]: The
install.shscript and installation instructions inSKILL.mdperform downloads to installuvand themineru[all]package from the standard Python Package Index (PyPI). - [PROMPT_INJECTION]: The skill is subject to indirect prompt injection risks because it processes untrusted external data.
- Ingestion points: The
file_pathparameter inpdf_parser.pyallows the skill to read any PDF file provided by a user or external source. - Boundary markers: There are no explicit boundary markers or instructions to the agent to ignore instructions embedded within the parsed PDF content.
- Capability inventory: The skill has the capability to execute subprocesses (
mineruCLI) and perform file system operations (creating directories and reading/writing files). - Sanitization: The skill does not perform any sanitization or filtering of the text extracted from the PDF before returning it to the agent.
Audit Metadata