paddleocr-text-recognition
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: Indirect Prompt Injection Surface. \n
- Ingestion points:
scripts/ocr_caller.pyaccepts untrusted data via the--file-urland--file-patharguments. \n - Boundary markers: Absent; the skill does not use delimiters or include instructions to ignore embedded content in the extracted text. \n
- Capability inventory:
scripts/lib.pyperforms network POST requests and reads local files;scripts/ocr_caller.pywrites output JSON to the filesystem. \n - Sanitization: Absent; the skill returns extracted text strings directly from the API response without validation or filtering. \n- [EXTERNAL_DOWNLOADS]: Functional network operations. \n
scripts/smoke_test.pyfetches a sample image from the vendor's official cloud storage (bcebos.com). \nscripts/lib.pycommunicates with the user-configured API endpoint (PADDLEOCR_OCR_API_URL) to perform text recognition.
Audit Metadata