literature-review
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [Command Execution] (LOW): The
generate_pdf.pyscript invokespandocandxelatexusingsubprocess.run. This is the core functionality for converting markdown to PDF. The script uses argument lists to prevent shell injection, but it remains a significant capability that relies on the presence of local system binaries.\n- [Data Exfiltration] (LOW): Theverify_citations.pyscript makes outbound HTTP requests todoi.organdapi.crossref.org. These domains are not on the pre-approved whitelist for exfiltration analysis. While the activity is restricted to fetching citation metadata, it establishes a network egress point to non-trusted domains.\n- [Indirect Prompt Injection] (LOW): The skill processes untrusted external data with a significant capability surface. 1. Ingestion points:verify_citations.pyfetches metadata from CrossRef API;search_databases.pyreads JSON search results. 2. Boundary markers: Absent; metadata is directly interpolated into formatted strings. 3. Capability inventory:subprocessexecution and network access. 4. Sanitization: Absent; content from external APIs is used without escaping, which could lead to indirect injection or LaTeX-based attacks during PDF generation.
Audit Metadata