literature-review
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The script
scripts/generate_pdf.pyexecutes external binaries to process documents. - Evidence: Lines 55 and 82 in
scripts/generate_pdf.pyusesubprocess.runto invokepandocandxelatex. - Risk: Malicious markdown content or a crafted LaTeX template could exploit LaTeX primitives (like
\write18or\input) to execute arbitrary shell commands or read sensitive files during the PDF compilation process. - [EXTERNAL_DOWNLOADS] (LOW): The skill performs network operations to retrieve citation metadata from external sources.
- Evidence:
scripts/verify_citations.pyuses therequestslibrary (Lines 38, 54) to querydoi.organdapi.crossref.org. - Risk: While these are legitimate academic APIs, they represent a dependency on external content that is not strictly validated before being processed.
- [PROMPT_INJECTION] (LOW): The skill is vulnerable to Indirect Prompt Injection through the processing of untrusted external metadata.
- Ingestion points:
scripts/verify_citations.pyingests data from the CrossRef API;scripts/search_databases.pyingests data from local JSON results files. - Boundary markers: Absent. Data from external sources is interpolated directly into strings for output.
- Capability inventory: The skill has file-writing capabilities (PDF/JSON) and prints to the console, which often serves as input for the next agent step.
- Sanitization: No sanitization or escaping is performed on fields like 'title', 'authors', or 'abstract'. If these fields contain malicious instructions, a downstream LLM agent reading the generated report may follow them.
Audit Metadata