extract-slide-text

Pass

Audited by Gen Agent Trust Hub on Apr 28, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: Executes the pdftotext system utility via subprocess.run to extract text from PDF files. The implementation correctly uses a list of arguments rather than a shell string, mitigating shell injection risks.
  • [PROMPT_INJECTION]: Exhibits an indirect prompt injection surface by reading arbitrary text from a PDF file and writing it to a markdown file. Ingestion points: Reads content from user-provided PDF files via pdftotext in extract_slide_text.py. Boundary markers: Extracted text is enclosed in markdown code blocks in the output file, providing some delimitation. Capability inventory: The skill has file system write access and the ability to execute the pdftotext binary. Sanitization: No specific sanitization or filtering of the PDF content is performed before interpolation into the output markdown.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 28, 2026, 04:20 PM