arxiv-search
Pass
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [SAFE]: Fetches research metadata from the official and well-known arXiv API (export.arxiv.org).
- [COMMAND_EXECUTION]: Uses local bash scripts to wrap Python functionality for searching and summarizing papers.
- [SAFE]: The summarization tool writes Markdown files to a user-specified directory, using regex-based sanitization to ensure safe filename generation from arXiv IDs.
- [PROMPT_INJECTION]: The skill has an indirect prompt injection surface as it ingests untrusted metadata (titles, abstracts) from the arXiv API.
- Ingestion points: Data enters the context via the arXiv Atom API response in
scripts/search.py. - Boundary markers: Extracted metadata is placed into Markdown files (
scripts/summarize.py) within standard sections like## Abstractbut lacks explicit instructions for downstream agents to ignore embedded commands. - Capability inventory: The skill performs network requests using
urllib.requestand local file writes usingpathlib. - Sanitization: While filenames are sanitized to prevent path traversal, the content of the abstracts is not sanitized or escaped for potential instructions.
Audit Metadata