Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/fill_fillable_fields.pyperforms runtime monkeypatching of thepypdflibrary to modify theDictionaryObject.get_inheritedmethod. This dynamic modification of library behavior is a risky coding practice that can lead to unexpected execution flows or instability. - [COMMAND_EXECUTION]: The documentation in
forms.mdandSKILL.mdinstructs the agent to use command-line tools likemagick,pdftotext,qpdf, andpdftk. These operations are potentially vulnerable to shell injection if the agent interpolates untrusted file paths or coordinates into the commands without proper sanitization. - [PROMPT_INJECTION]: The skill is designed to ingest and process untrusted PDF documents and associated JSON metadata, creating a surface for indirect prompt injection. Evidence: 1. Ingestion points: The scripts
scripts/extract_form_field_info.py,scripts/extract_form_structure.py, andscripts/convert_pdf_to_images.pyread external .pdf files. 2. Boundary markers: No explicit boundary markers or instructions to ignore embedded PDF content are used during extraction. 3. Capability inventory: The skill possesses capabilities for file reading, file writing, and image generation across multiple scripts. 4. Sanitization: There is no evidence of sanitization or filtering for text content or metadata extracted from the PDFs before it is used to influence the agent's form-filling logic.
Audit Metadata