chemical-file-converter
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runto call theobabel(Open Babel) command-line interface for file conversion tasks. These calls are implemented using argument lists rather than shell strings, which is a secure practice that prevents shell injection. This behavior is essential to the skill's primary purpose. - [INDIRECT_PROMPT_INJECTION]: The script parses metadata, such as molecule titles, directly from chemical files provided by the user. If an attacker crafts a file with embedded instructions in the metadata fields, it could potentially influence the agent if it subsequently processes the file content or conversion logs. This represents a known indirect prompt injection surface common to file-processing utilities.
- Ingestion points:
scripts/convert_chemical.py(via_read_xyz,_read_sdf, and_read_gaussianmethods). - Boundary markers: None detected.
- Capability inventory: Local file read/write and execution of the
obabelutility. - Sanitization: The script does not sanitize molecular metadata extracted from input files before writing them to output files or displaying them.
Audit Metadata