uv-read-arxiv-paper
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches PDF documents and LaTeX source code from arxiv.org, a well-known and trusted academic repository. These downloads are performed using Python's standard library to gather research material for the agent's analysis.
- [COMMAND_EXECUTION]: Executes local Python scripts within the skill directory to automate the download, management, and extraction of research files. These operations are restricted to the configured agent workspace.
- [PROMPT_INJECTION]: Subject to indirect prompt injection risks due to the processing of external document content.
- Ingestion points: Processes LaTeX source files and PDF text content downloaded from external arxiv.org URLs.
- Boundary markers: Lacks explicit delimiters or instructions to prevent the agent from following potential embedded commands within the research papers.
- Capability inventory: Possesses capabilities to write to the local filesystem and perform network requests via Python scripts.
- Sanitization: Implements path-traversal validation (TarSlip prevention) in the extraction script, but does not sanitize or filter the textual content of papers for malicious prompt patterns.
Audit Metadata