analyzing-pdf-malware-with-pdfid
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The provided script
scripts/agent.pyutilizes thesubprocess.runmethod to call external command-line tools likepdf-parser. This behavior is the intended primary function of the skill for malware analysis and does not involve the use ofshell=Trueor arbitrary user-supplied command strings. - [PROMPT_INJECTION]: The skill facilitates the ingestion of untrusted data from PDF files, which introduces a potential surface for indirect prompt injection. A maliciously crafted PDF could contain text or metadata intended to influence the agent's analysis or subsequent instructions.
- Ingestion points: The skill reads content from external PDF documents through
scripts/agent.pyand the tools documented inSKILL.md. - Boundary markers: There are no specific boundary markers or instructions to the agent to treat the extracted content as untrusted data, although the report generation is structured.
- Capability inventory: The agent has the ability to read files and execute specific local analysis processes.
- Sanitization: The Python agent uses
latin-1decoding witherrors="replace"to prevent binary parsing errors, but it does not perform semantic sanitization of the extracted text before presenting it to the agent.
Audit Metadata