agentic-doc-parse-and-extract
Fail
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches installation scripts and pre-compiled binaries from the vendor's official GitHub repository and cloud storage endpoints (aliyuncs.com).
- [REMOTE_CODE_EXECUTION]: Provides instructions to download and execute setup scripts (adp-init.sh and adp-init.ps1) directly from the vendor's GitHub repository.
- [COMMAND_EXECUTION]: Executes the
adpcommand-line tool to perform document parsing, extraction, and configuration. The installation guide includes steps that modify system environment variables and suggest the use of elevated privileges viasudoor administrator-level commands. - [PROMPT_INJECTION]: The skill processes document content from external URLs and local paths, which constitutes an indirect prompt injection surface.
- Ingestion points: Use of
adp parse url,adp extract url, and local folder processing commands inSKILL.mdandreferences/commands.md. - Boundary markers: The skill does not instruct the agent to use delimiters or ignore instructions within the documents being processed.
- Capability inventory: The agent has access to shell command execution (
adp), network operations, and file read/write capabilities through the CLI tool. - Sanitization: No explicit sanitization or validation of the processed document content is documented before it is returned to the agent context.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/laiye-ai/adp-cli/main/scripts/adp-init.sh - DO NOT USE without thorough review
Audit Metadata