scholar-deep-research
Pass
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill locates and executes a local Python script from a related skill to facilitate PDF downloads.
- Evidence:
scripts/_pdf_fetch.pycontains logic to findfetch.pywithin several pre-defined skill directories and plugin caches, executing it viasubprocess.runto resolve DOIs. - This execution is limited to local files and is intended for cross-skill integration with the author's other tools.
- [COMMAND_EXECUTION]: The skill uses sub-processes to run PDF extraction and utility scripts.
- Evidence:
scripts/extract_pdf.py,scripts/prefetch_pdfs.py, andscripts/_pdf_fetch.pyutilizesubprocess.runfor core tasks. - Security Risk Mitigation: DOIs and other paper identifiers are validated against strict regular expressions (e.g.,
DOI_REinscripts/research_state.py) before being used as command arguments. - [EXTERNAL_DOWNLOADS]: The research workflow involves extensive interaction with academic web services.
- Evidence: Scripts connect to
api.openalex.org,export.arxiv.org,api.crossref.org,eutils.ncbi.nlm.nih.gov,dblp.org,api.semanticscholar.org,www.ebi.ac.uk, andexa.aito retrieve metadata and paper summaries. - These domains are well-known academic infrastructure and consistent with the skill's primary research purpose.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection by processing untrusted data from external papers.
- Evidence:
scripts/extract_pdf.pyingests full text from potentially malicious PDFs, andscripts/search_exa.pyingests snippets from the open web. This data is then processed by an agent in Phase 3. - Ingestion points:
scripts/extract_pdf.py(pypdf text extraction),scripts/search_exa.py(web highlights). - Capability inventory:
subprocess.run(execution),httpx(network access), and state file mutation capabilities exist within the same environment.
Audit Metadata