pdf-processing-anthropic
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (LOW): The skill processes external PDF documents through text extraction and image conversion, which creates a surface for indirect prompt injection if a processed document contains malicious instructions for the agent.
- Ingestion points: PDF content is ingested via
scripts/extract_form_field_info.py(metadata) andscripts/convert_pdf_to_images.py(visual analysis). - Boundary markers: No explicit delimiters or instructions to ignore embedded content are used in the data processing pipeline.
- Capability inventory: The skill possesses extensive file manipulation capabilities, including reading/writing PDFs, images, JSON, and Excel files.
- Sanitization: No content-based sanitization or instruction-filtering is applied to the data extracted from the PDFs.
- Dynamic Execution (LOW): The script
scripts/fill_fillable_fields.pyperforms runtime monkeypatching on thepypdflibrary. It interceptsDictionaryObject.get_inheritedto fix a known issue with selection list formatting. While monkeypatching is generally a high-risk technique (Category 10), it is here used for a targeted, documented bug fix by a trusted author, thus maintaining a LOW severity. - Command Execution (SAFE):
SKILL.mdprovides documentation for standard CLI tools likeqpdfandpdftk. These are presented as user/agent instructions and do not represent arbitrary command execution within the skill's own scripts.
Audit Metadata