geo-report-pdf

Fail

Audited by Gen Agent Trust Hub on Feb 27, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes a system command to run a Python script for PDF generation located at ~/.claude/skills/geo/scripts/generate_pdf_report.py.
  • [COMMAND_EXECUTION]: Input values extracted from untrusted markdown files (such as the brand name) are used directly as command-line arguments ("GEO-REPORT-[brand_name].pdf"). This lacks shell escaping or sanitization, creating a high risk of command injection if the source data contains shell metacharacters.
  • [COMMAND_EXECUTION]: The skill processes untrusted data from local GEO audit files with a broad capability set. Mandatory Evidence Chain: 1. Ingestion points: GEO-*.md files in the current directory; 2. Boundary markers: Absent; 3. Capability inventory: System command execution via python3; 4. Sanitization: No input validation or shell escaping performed.
  • [EXTERNAL_DOWNLOADS]: The skill requires the installation of the reportlab library via pip. As a well-known package for PDF generation, this dependency is documented neutrally and does not contribute to verdict escalation.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 27, 2026, 01:01 PM