OCR with python

PassAudited by VirusTotal on May 12, 2026.

Findings (1)

The skill provides OCR functionality using standard libraries. However, the `scripts/ocr.py` script directly uses user-provided file paths for input (`file`) and output (`output`) without explicit sanitization. This creates a vulnerability where a malicious agent or user could potentially read or overwrite arbitrary files on the system by providing crafted paths (e.g., `/etc/passwd` or `../../sensitive.txt`). While this is a significant security risk (arbitrary file read/write), there is no clear evidence of intentional malicious behavior such as data exfiltration, backdoor installation, or prompt injection against the agent, thus classifying it as suspicious rather than malicious.