Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- Indirect Prompt Injection (HIGH): The skill is highly vulnerable to instructions embedded within processed PDF files.
- Ingestion points: Untrusted data enters via
pypdf,pdfplumber, and OCR results frompytesseractinSKILL.mdand variousscripts/. - Boundary markers: No delimiters or safety instructions are provided to help the agent distinguish between document content and its own instructions.
- Capability inventory: The skill has extensive file-write capabilities (
writer.write,image.save,df.to_excel) and execution of CLI tools. - Sanitization: Extracted text is used directly without validation or escaping.
- Command Execution (MEDIUM):
SKILL.mdexplicitly directs the agent to execute shell commands using tools likeqpdf,pdftotext, andpdftk. This capability can be leveraged by a successful prompt injection to perform unauthorized file operations or system exploration. - External Downloads (LOW):
SKILL.mdsuggests installing several Python packages (pytesseract,pdf2image,pdfplumber,reportlab,pypdf). - Evidence: These are standard, well-maintained libraries. Per [TRUST-SCOPE-RULE], this finding is downgraded to LOW/INFO as the sources are reputable registries (PyPI).
Recommendations
- AI detected serious security threats
Audit Metadata