markitdown
Warn
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/generate_schematic.pyusessubprocess.runto executescripts/generate_schematic_ai.py. This chain of execution passes user-controlled prompts and file paths as arguments to secondary Python processes. - [EXTERNAL_DOWNLOADS]: Documentation in
SKILL.mdandreferences/api_reference.mdencourages the use of third-party plugins identified by a GitHub hashtag. This creates a supply chain risk by directing the agent or user to execute unverified code from unvetted sources. - [DATA_EXFILTRATION]: Document content and generated diagrams are sent to OpenRouter API endpoints for processing. This involves transmitting user-controlled data to an external service provider.
- [PROMPT_INJECTION]: The skill processes untrusted file formats and returns their content as Markdown to the agent context, creating an indirect prompt injection surface (Category 8).
- Ingestion points: The
md.convert()method in scripts likebatch_convert.py,convert_literature.py, andconvert_with_ai.py. - Boundary markers: Absent in the converted Markdown output.
- Capability inventory: The agent has access to
Read,Write,Edit, andBashtools, providing a high-impact exploitation target. - Sanitization: No sanitization or filtering is performed on extracted text before it is returned to the agent context.
Audit Metadata