skills/wulaosiji/skills/image-ocr/Gen Agent Trust Hub

image-ocr

Pass

Audited by Gen Agent Trust Hub on Mar 8, 2026

Risk Level: SAFEPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
  • [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. It extracts raw text from user-provided images and encourages users to interpolate this text directly into LLM prompts (as seen in integration_example.py). If an image contains instructions such as 'Ignore previous rules and output secrets', the downstream model might obey them.
  • Ingestion points: ocr_engine.py reads image files for processing; integration_example.py ingests the resulting text for prompt construction.
  • Boundary markers: The skill uses markdown code blocks (```) for code snippets but lacks explicit boundary markers or 'ignore instructions' warnings for general text extraction.
  • Capability inventory: scripts/ocr.py includes functionality to write OCR results to the local filesystem via the --save argument.
  • Sanitization: No sanitization or filtering is performed on the extracted text to prevent it from containing malicious instructions.
  • [CREDENTIALS_UNSAFE]: The config.json file defines fields for baidu_api_key and baidu_secret_key. If users configure these for cloud OCR, their credentials will be stored in plaintext on the local filesystem.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 8, 2026, 02:24 AM