sci-figure
Pass
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The script
src/utils.pyusessubprocess.runto check for the presence of the Tesseract OCR binary. The call uses a hardcoded argument (--version) and target path, posing no security risk of argument injection or unauthorized command execution. - [DYNAMIC_EXECUTION]: The
check_dependenciesfunction insrc/utils.pyutilizes__import__to verify the installation of required Python modules. The module names are retrieved from a static, hardcoded dictionary, which prevents any arbitrary module loading or code execution. - [OBFUSCATION]: The file
README_CN.mdcontains several ASCII control characters, such as backspace (U+0008) and form feed (U+000C), within text likebash,apt, andfigure. These appear to be unintentional encoding artifacts or document creation residues rather than malicious obfuscation, as they do not hide malicious intent or affect the functionality of the code. - [INDIRECT_PROMPT_INJECTION]: The skill processes external PDF files, which represents an attack surface for indirect prompt injection. However, since the skill only performs local image extraction and does not feed extracted text into further LLM decision-making logic or security-sensitive prompts, the actual risk is negligible.
Audit Metadata