pdf-official
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to use several system-level utilities for PDF manipulation, including
pdftotext,pdfimages,pdftoppm,qpdf, andpdftk. It also executes custom Python scripts provided in thescripts/directory to manage form field extraction, bounding box validation, and document filling. Notably,scripts/fill_fillable_fields.pymodifies thepypdflibrary at runtime using a monkeypatch to fix a specific formatting bug in version 5.7.0. - [PROMPT_INJECTION]: The skill's primary function involves parsing untrusted PDF documents, which represents an attack surface for indirect prompt injection.
- Ingestion points: PDF data is ingested and processed using multiple libraries such as
pypdf,pdfplumber, andpdf2imagein scripts likeextract_form_field_info.pyandconvert_pdf_to_images.py. - Boundary markers: The skill documentation and scripts do not implement specific delimiters or instructions to ignore potential commands embedded within the PDF content.
- Capability inventory: The agent is granted capabilities to perform filesystem operations (reading and writing PDF, JSON, and image files) and execute shell-based commands and Python scripts.
- Sanitization: No explicit sanitization or filtering of the extracted text content is performed before it is analyzed by the agent to determine the purpose of form fields or extract data.
Audit Metadata