arxiv-doc-builder
Fail
Audited by Gen Agent Trust Hub on May 5, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: A significant command injection vulnerability was identified in
arxiv_doc_builder/fetch_paper.py. The skill processes anarxiv_idfrom the user and uses it to construct file paths. One such path is interpolated into a shell command string (f'gunzip -c "{path}" | file --brief -') that is executed viasubprocess.runwithshell=True. Although the script attempts to normalize the ID by replacing forward slashes, it does not sanitize other shell-sensitive characters like double quotes or semicolons, allowing an attacker to break out of the command context and execute arbitrary code. - [EXTERNAL_DOWNLOADS]: The skill is designed to download research materials from
arxiv.organd its associated API. It usescurlto fetch LaTeX source archives and PDF files. These network operations are legitimate for the skill's purpose and target well-known, trusted academic infrastructure. - [COMMAND_EXECUTION]: The normalization logic in
safe_arxiv_idis insufficient to prevent directory traversal. By providing an ID containing..sequences, an attacker could potentially influence where files are created on the filesystem, as the resulting paths are used inmkdirandcurl -ooperations.
Recommendations
- AI detected serious security threats
Audit Metadata