geo-report-pdf
Fail
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a system command to run a Python script for PDF generation located at
~/.claude/skills/geo/scripts/generate_pdf_report.py. - [COMMAND_EXECUTION]: Input values extracted from untrusted markdown files (such as the brand name) are used directly as command-line arguments (
"GEO-REPORT-[brand_name].pdf"). This lacks shell escaping or sanitization, creating a high risk of command injection if the source data contains shell metacharacters. - [COMMAND_EXECUTION]: The skill processes untrusted data from local GEO audit files with a broad capability set. Mandatory Evidence Chain: 1. Ingestion points:
GEO-*.mdfiles in the current directory; 2. Boundary markers: Absent; 3. Capability inventory: System command execution viapython3; 4. Sanitization: No input validation or shell escaping performed. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
reportlablibrary via pip. As a well-known package for PDF generation, this dependency is documented neutrally and does not contribute to verdict escalation.
Recommendations
- AI detected serious security threats
Audit Metadata