extract-slide-text
Pass
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Executes the pdftotext system utility via subprocess.run to extract text from PDF files. The implementation correctly uses a list of arguments rather than a shell string, mitigating shell injection risks.
- [PROMPT_INJECTION]: Exhibits an indirect prompt injection surface by reading arbitrary text from a PDF file and writing it to a markdown file. Ingestion points: Reads content from user-provided PDF files via pdftotext in extract_slide_text.py. Boundary markers: Extracted text is enclosed in markdown code blocks in the output file, providing some delimitation. Capability inventory: The skill has file system write access and the ability to execute the pdftotext binary. Sanitization: No specific sanitization or filtering of the PDF content is performed before interpolation into the output markdown.
Audit Metadata