arxiv-doc-builder

Fail

Audited by Gen Agent Trust Hub on Apr 8, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION]: Shell command injection vulnerability in arxiv_doc_builder/fetch_paper.py. The function _detect_file_type executes a shell command using subprocess.run with shell=True to execute a command containing a file path derived from the user-supplied arxiv_id. Because the ID is not properly sanitized for shell metacharacters, an attacker can execute arbitrary code on the system.\n- [COMMAND_EXECUTION]: Path traversal and arbitrary file write vulnerability in arxiv_doc_builder/fetch_paper.py. The _extract_gzip_single function extracts a filename from gzip metadata via the file command and uses it as a write path without validation. A malicious file could use ../ sequences to write files to unauthorized locations.\n- [PROMPT_INJECTION]: Potential for Indirect Prompt Injection. The skill fetches and converts untrusted academic papers (LaTeX/PDF) into Markdown for agent consumption. There are no boundary markers or sanitization steps to prevent embedded instructions in the papers from influencing agent behavior. Ingestion: fetch_paper.py. Boundary markers: Absent. Capability inventory: Subprocess calls for pandoc, curl, tar, gunzip, and file. Sanitization: Absent.\n- [EXTERNAL_DOWNLOADS]: Fetches paper materials from arxiv.org. While this is the intended functionality, the lack of input validation makes the fetching process a vector for other attacks.\n- [DATA_EXFILTRATION]: Insecure HTTP usage in arxiv_doc_builder/convert_latex.py. The fetch_title_from_arxiv function queries the arXiv API over http instead of https, which could allow interception of the data.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 8, 2026, 08:00 AM