mineru-pdf
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (LOW): The script
scripts/mineru_parse.shexecutes theminerucommand. It employs shell best practices by using arrays (args[@]) to handle arguments, which mitigates standard command injection through malicious filenames. However, it allows arbitrary command selection via theMINERU_CMDenvironment variable. - PROMPT_INJECTION (LOW): Category 8: Indirect Prompt Injection. The skill parses untrusted PDF files into Markdown and JSON for agent consumption, creating a surface for embedded instructions.
- Ingestion points:
scripts/mineru_parse.shprocesses local PDF files specified by the user or agent. - Boundary markers: Absent. The skill produces raw structured text without delimiters or warnings to the downstream agent about the untrusted nature of the content.
- Capability inventory: Subprocess execution of the
minerutool and file system write access viamkdir. - Sanitization: None. The skill performs a literal extraction of text and layout data from the source document.
Audit Metadata