book-to-skill
Pass
Audited by Gen Agent Trust Hub on May 5, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes untrusted text from user-provided PDF and EPUB files.
- Ingestion points: The skill reads the extracted book text from
/tmp/book_skill_work/full_text.txtduring the analysis (Step 3) and generation (Step 7) phases inSKILL.md. - Boundary markers: There are no explicit delimiters or "ignore embedded instructions" warnings used when the agent is instructed to read and summarize the book content.
- Capability inventory: The agent has access to powerful tools like
Bash,Read, andWritewhich could be target for misuse if the agent follows malicious instructions hidden within a book. - Sanitization: The skill does not perform any sanitization or filtering of the extracted text before passing it to the model for analysis.
- [COMMAND_EXECUTION]: The skill uses shell commands and a Python script to perform file operations and text extraction.
- Evidence: The
extract.pyscript usessubprocess.run()to invoke system utilities likepdftotextandpdfinfo. These calls use list-based arguments, which is a recommended security practice to prevent shell injection vulnerabilities. - Evidence:
SKILL.mduses several standard tools such asmkdir,cp,find, andcatto manage the skill's directory structure and files. - [EXTERNAL_DOWNLOADS]: The skill relies on and recommends several external dependencies for its functionality.
- Evidence: The README suggests installing standard libraries and utilities including
poppler-utils,PyPDF2,pdfminer.six,docling,ebooklib, andbeautifulsoup4from official registries. - Evidence: Installation instructions involve downloading the skill components directly from the author's public GitHub repository using
curl.
Audit Metadata