Skywork Document
Pass
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its document parsing functionality.
- Ingestion points: User-provided files (PDF, DOCX, etc.) are processed by
scripts/parse_file.pyto extract text. - Boundary markers: The instructions lack explicit delimiters or safety warnings to ignore instructions embedded within the processed file content.
- Capability inventory: The skill has the ability to make network requests to vendor APIs (
create_doc.py), write files to the local file system, and execute shell commands for authentication. - Sanitization: There is no evidence of sanitization or escaping of the extracted file content before it is passed to the document generation prompt.
- [COMMAND_EXECUTION]: The authentication module executes system commands to facilitate the login process.
- Evidence: In
scripts/skywork_auth.py, the_open_browserfunction utilizessubprocess.Popento call system utilities (openon macOS,starton Windows, andxdg-openon Linux) to open the vendor's authentication URL in the user's browser. Whileshell=Trueis used on Windows, the URL is constructed from controlled components.
Audit Metadata