Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- PROMPT_INJECTION (HIGH): The skill is vulnerable to indirect prompt injection (Category 8). It ingests untrusted PDF data through text extraction and OCR (evidence in
scripts/extract_form_field_info.pyandscripts/convert_pdf_to_images.py). Since the skill includes capabilities to write and modify files (evidence inscripts/fill_fillable_fields.pyandscripts/fill_pdf_form_with_annotations.py), a malicious PDF could contain instructions designed to influence the agent's behavior. There are no boundary markers or sanitization steps implemented to mitigate this risk. - COMMAND_EXECUTION (LOW): The documentation in
SKILL.mdsuggests using command-line tools likeqpdfandpdftk. If filenames are not properly handled by the agent, this could lead to shell injection vulnerabilities. - DYNAMIC_EXECUTION (MEDIUM): The script
scripts/fill_fillable_fields.pyimplements a runtime monkeypatch of thepypdflibrary. While the intent is a bug fix, modifying library behavior at runtime (Category 10) is a risky practice that should be reviewed as it can lead to unexpected side effects or bypass security assumptions.
Recommendations
- AI detected serious security threats
Audit Metadata