paddleocr-text-recognition
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The skill transmits file content or URLs to a remote API endpoint for processing.\n
- Evidence:
scripts/lib.pyuseshttpx.postto send base64-encoded image data.\n - Configuration: The endpoint is set via the
PADDLEOCR_OCR_API_URLenvironment variable.\n- [EXTERNAL_DOWNLOADS]: The smoke test script references an external sample image.\n - Evidence:
scripts/smoke_test.pyuses a URL from thePaddlePaddleGitHub repository to verify connectivity.\n- [PROMPT_INJECTION]: Vulnerable to indirect prompt injection from content within scanned files.\n - Ingestion points:
scripts/lib.py(viaocrfunction reading local files or URLs).\n - Boundary markers: None identified in instructions to the agent.\n
- Capability inventory: Network access (
httpx) and file system access (Path.read_bytes).\n - Sanitization: No filtering or sanitization of recognized text is performed.\n- [COMMAND_EXECUTION]: The skill is implemented as a set of Python scripts intended for local execution.\n
- Evidence:
SKILL.mdspecifies the use ofscripts/ocr_caller.py,scripts/configure.py, andscripts/smoke_test.py.
Audit Metadata