pdf-converter

Fail

Audited by Snyk on May 15, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). High risk — the package instructs piping remote installer scripts (install.sh / install.ps1) from a third‑party CDN into a shell/PowerShell (a common malware vector); while the GitHub repo looks plausibly official and example.com is benign, executing remote .sh/.ps1 without verifying the code or the CDN is unsafe.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's SKILL.md explicitly accepts and extracts documents from arbitrary public URLs (e.g., "mineru-open-api flash-extract https://example.com/paper.pdf") and directs the agent to read and act on the extracted content (summarize, extract tables, etc.), which means untrusted, user-provided web content can materially influence the agent's actions.

Issues (2)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
CRITICAL
Analyzed
May 15, 2026, 02:50 PM
Issues
2