pdf-to-images
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/pdf_to_images.pyexecutes ImageMagick commands (magickorconvert) usingsubprocess.run. It correctly passes arguments as a list, which prevents shell injection vulnerabilities by avoiding the use ofshell=True. - [COMMAND_EXECUTION]: Documentation in
SKILL.mdincludessudocommands for installing ImageMagick and updating the/etc/ImageMagick-*/policy.xmlfile. These instructions are standard procedure for enabling PDF processing capabilities in ImageMagick on Linux and macOS. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it processes external PDF files provided by the user.
- Ingestion points: The
pdf_fileargument inscripts/pdf_to_images.pyand theUSER_PDF_FILEplaceholder inSKILL.md. - Boundary markers: None present to delimit content inside the PDF.
- Capability inventory: Local file system access (read/write) and execution of the ImageMagick binary.
- Sanitization: The Python script validates that the input file exists and has a
.pdfextension before execution.
Audit Metadata