pdf-converter
Fail
Audited by Snyk on May 15, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.90). High risk — the package instructs piping remote installer scripts (install.sh / install.ps1) from a third‑party CDN into a shell/PowerShell (a common malware vector); while the GitHub repo looks plausibly official and example.com is benign, executing remote .sh/.ps1 without verifying the code or the CDN is unsafe.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's SKILL.md explicitly accepts and extracts documents from arbitrary public URLs (e.g., "mineru-open-api flash-extract https://example.com/paper.pdf") and directs the agent to read and act on the extracted content (summarize, extract tables, etc.), which means untrusted, user-provided web content can materially influence the agent's actions.
Issues (2)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
Audit Metadata