writing-latex
Warn
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
INSTRUCTIONS.mdfile advises using the-shell-escapeflag when compiling LaTeX documents (e.g.,uplatex -shell-escape document.tex). This flag allows the compilation process to execute arbitrary shell commands on the host system, creating a significant security risk if the LaTeX source is untrusted or contains malicious code. - [COMMAND_EXECUTION]: In
references/DOCUMENT-CLASSES.md, the skill includes an example compilation script and instructs the user to grant it full permissions usingchmod 777 compile. Setting world-writable and world-executable permissions on scripts is an insecure practice that facilitates unauthorized modification and execution. - [REMOTE_CODE_EXECUTION]: The
-shell-escapeflag enables a Remote Code Execution (RCE) vector. Since the skill is designed to process and compile.texfiles, an attacker providing a malicious document could gain arbitrary command execution on the agent's environment. - [COMMAND_EXECUTION]: The skill exhibits an indirect command execution surface related to processing untrusted data.
- Ingestion points: Processes
.texfiles as indicated in the skill's description inSKILL.md. - Boundary markers: Absent; no delimiters or warnings are used to differentiate untrusted document content from agent instructions.
- Capability inventory: Compilation using
uplatexorlatexmkwith the-shell-escapeflag, which allows arbitrary shell commands (documented inINSTRUCTIONS.md). - Sanitization: Absent; the skill does not suggest any escaping or validation of LaTeX source code before compilation.
Audit Metadata