Trust Assessment
pdf received a trust score of 86/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Direct file system access with potential for untrusted path input.
The analysis covered 4 layers: dependency_graph, static_code_analysis, manifest_analysis, llm_behavioral_safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 11, 2026 (commit 6195a031). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Direct file system access with potential for untrusted path input The skill demonstrates extensive interaction with the local file system through Python libraries (`pypdf`, `pdfplumber`, `reportlab`). Functions like `PdfReader()`, `pdfplumber.open()`, `open()`, and `canvas.Canvas()` are used to read from and write to files. If the filenames or paths provided to these functions are derived from untrusted user input without strict validation and sanitization, an attacker could specify arbitrary file paths. This could lead to:
- **Data Exfiltration (SS-LLM-002)**: Reading sensitive files from the agent's host system (e.g., `/etc/passwd`, `/app/secrets.txt`).
- **Excessive Permissions**: Writing to arbitrary locations, potentially overwriting critical system files, injecting malicious content, or causing denial of service. When implementing tools based on this skill, ensure that all file paths derived from user input are strictly validated and sanitized. Implement robust input validation to restrict file access to a specific, isolated directory (e.g., a temporary sandbox). Avoid directly concatenating user input into file paths. Consider using allowlists for file extensions and names, and disallow absolute paths or directory traversal sequences (e.g., `../`). | Unknown | SKILL.md:8 |
Scan History
Embed Code
[](https://skillshield.io/report/652f6f9c4706706c)
Powered by SkillShield