Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- PROMPT_INJECTION (HIGH): The skill is highly susceptible to Indirect Prompt Injection. Ingestion points include text/table extraction using
pdfplumberandpypdf, as well as visual analysis of images generated from PDF pages. There are no boundary markers or sanitization steps mentioned, and the agent is explicitly instructed to 'determine the purpose' of extracted content. The agent's capabilities include writing files and executing arbitrary commands, making successful injection very impactful. - COMMAND_EXECUTION (MEDIUM): The skill encourages the use of CLI tools like
qpdf,pdftotext, andpdftk. If an agent uses data extracted from a malicious PDF (such as a title or metadata) to construct these commands, it could lead to command injection. - CREDENTIALS_UNSAFE (MEDIUM): Documentation in
SKILL.mdprovides examples where passwords are passed as cleartext command-line arguments (e.g.,qpdf --password=mypassword), which is a significant security risk for credential exposure in process lists or shell history. - EXTERNAL_DOWNLOADS (LOW): The skill relies on multiple Python packages including
pypdf,pdfplumber,reportlab,pytesseract,pdf2image,pandas, andPillow. None of these dependencies are version-pinned, which can lead to supply chain risks or inconsistent behavior. - Dynamic Execution (MEDIUM): The script
scripts/fill_fillable_fields.pyperforms a runtime monkeypatch of thepypdflibrary'sDictionaryObject.get_inheritedmethod. While intended to fix a specific bug, runtime modification of third-party libraries is a risky practice that can lead to unexpected side effects or be exploited if the patch logic is flawed.
Recommendations
- AI detected serious security threats
Audit Metadata