Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Prompt Injection (HIGH): Vulnerable to indirect prompt injection through untrusted PDF files.
- Ingestion points:
scripts/convert_pdf_to_images.py,scripts/extract_form_field_info.py, andSKILL.mdexamples usepypdfandpdfplumberto ingest external PDF data. - Boundary markers: Absent. The agent is instructed to visually analyze and extract data without technical sanitization or delimiters.
- Capability inventory: Can write files (
output.pdf,extracted_tables.xlsx) and execute system commands (qpdf,pdftotext). - Sanitization: None. Extracted text is used directly for agent reasoning and file creation.
- Dynamic Execution (MEDIUM):
scripts/fill_fillable_fields.pyuses monkeypatching to modify thepypdflibrary at runtime. - Evidence: The
monkeypatch_pydpf_methodfunction replacespypdf.generic.DictionaryObject.get_inheritedwith a local version to bypass a bug. - Risk: While intended as a fix, runtime modification of library classes is a form of dynamic execution that increases the attack surface.
- Command Execution (LOW): The skill documentation provides examples for executing several system binaries.
- Evidence:
SKILL.mdincludes shell commands forpdftotext,qpdf, andpdftk.
Recommendations
- AI detected serious security threats
Audit Metadata