hwp
Warn
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill downloads and installs several Python packages at runtime from the public PyPI registry. This is seen in both the
SKILL.mdworkflow and theinstall_packagefunction withinscripts/hwp_reader.py. These packages are not pinned to specific versions. - Evidence in
SKILL.md:pip install -q pyhwp2md - Evidence in
scripts/hwp_reader.py:install_package("python-hwpx"),install_package("six"),install_package("pyhwp"). - [REMOTE_CODE_EXECUTION]: By installing and then importing or executing packages at runtime (such as via
uvx,pipx run, orpip install), the skill executes code downloaded from external sources. Thescripts/hwp_reader.pyscript specifically usessubprocess.runto callpipand then proceeds toimport hwpxorimport hwp5to process files. - [COMMAND_EXECUTION]: The skill uses
subprocess.runto execute external command-line utilities and system commands. scripts/hwp_reader.pyexecuteshwp5txtandhwp5htmlto process documents.scripts/hwp_reader.pyusespip installwith the--break-system-packagesflag to bypass environment restrictions if a standard installation fails.SKILL.mdinstructs the agent to run a bash script that usescommand -vand subshells to detect and run package managers.- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests untrusted data from external files and injects the output into the agent's context.
- Ingestion points: The skill reads user-provided files via
[file-path]inSKILL.mdandscripts/hwp_reader.py. - Boundary markers: None. Extracted text from HWP documents is printed directly to stdout and included in the conversation context without delimiters or instructions to ignore embedded commands.
- Capability inventory: The agent has the ability to run shell commands (via
subprocess.runand bash scripts) and perform file operations. - Sanitization: The
HwpHtmlExtractorclass inscripts/html_extractor.pyand the regex cleaning inscripts/hwp_reader.pyfocus on structural parsing and noise removal but do not sanitize the content for malicious instructions or escape sequence characters.
Audit Metadata