pdf-ocr
Warn
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The file
scripts/pdf_ocr_processor.pyimplements aninstall_dependencyfunction that executespip installusingsubprocess.check_call. This allows the skill to modify the local environment by installing packages likerapidocr_onnxruntime,pymupdf, andpillowduring execution. - [EXTERNAL_DOWNLOADS]: The skill performs network requests to
https://api.siliconflow.cnfor cloud-based OCR processing and initiates package downloads from the Python Package Index (PyPI). - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface due to processing untrusted document content. 1. Ingestion points:
pdf_pathandimage_pathinscripts/pdf_ocr_processor.py. 2. Boundary markers: No delimiters or 'ignore' instructions are used in the prompt sent to the OCR model. 3. Capability inventory: The skill has access to subprocess execution and network requests. 4. Sanitization: No validation or sanitization of the text extracted from external files is performed.
Audit Metadata