Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Pdf

v1.0.0

Use this skill whenever the user wants to do anything with PDF files. This includes reading or extracting text/tables from PDFs, combining or merging multipl...

0· 81·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for yang1002378395-cmyk/pdf-processor-cn.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Pdf" (yang1002378395-cmyk/pdf-processor-cn) from ClawHub.
Skill page: https://clawhub.ai/yang1002378395-cmyk/pdf-processor-cn
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install pdf-processor-cn

ClawHub CLI

Package manager switcher

npx clawhub@latest install pdf-processor-cn
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill name/description (general PDF processing: text/tables, merge/split, OCR, encrypt/decrypt, images, forms) is broadly consistent with the supplied materials, but the included code is heavily focused on form extraction and filling (scripts to extract form fields/structure, convert pages to images, validate bounding boxes, and write annotations). SKILL.md and reference.md mention OCR, encryption/decryption, and many external command-line tools (pdftotext, qpdf, pdftk, magick, pypdfium2) but there are no scripts implementing OCR or encryption/decryption, and no explicit dependency list. This is a capability mismatch (claimed features vs. shipped code).
Instruction Scope
The SKILL.md and FORMS.md instruct the agent to run the included scripts and some external command-line tools. The scripts operate on user-supplied PDF files and JSON files only (no network calls or reading unrelated system files). Two noteworthy items: (1) instructions tell you to use external utilities (ImageMagick 'magick'/'convert', poppler-utils, qpdf, pdftk) but the skill's metadata does not declare those binaries as required; (2) scripts monkeypatch pypdf internals (DictionaryObject.get_inherited) to handle certain PDF field encodings — this changes library behavior at runtime and should be understood before use. The instructions otherwise do not direct the agent to read or exfiltrate unrelated data.
Install Mechanism
This is an instruction-only skill with included Python scripts and no install spec. That is low-risk from an installer perspective, but the skill implicitly depends on multiple Python packages (pypdf, pdfplumber, pdf2image, PIL/Pillow, possibly pdf2image->poppler) and system binaries (poppler tools for pdf2image, ImageMagick for crop workflows, qpdf/pdftk for advanced ops). Those dependencies are not declared nor provided by an install step; that mismatch can cause runtime errors or lead users to install third-party binaries from untrusted sources.
Credentials
The skill requests no environment variables, credentials, or special config paths. The scripts only read and write files the user specifies (PDFs, JSONs, images). There is no evidence of credential access or remote endpoints in the code.
Persistence & Privilege
The skill does not request permanent presence (always:false) and does not modify other skills or system-wide configs. It runs local scripts and writes output files; it does not persist into agent configuration or install background services.
What to consider before installing
What to consider before installing/using this skill: - Functionality: The packaged scripts are focused on form extraction/filling and image conversion; other claimed features (OCR, encryption/decryption) are referenced in docs but not implemented in the shipped scripts. If you need OCR or password handling, confirm which tools the agent will actually use (e.g., Tesseract, qpdf) and whether those will be available/trusted. - Dependencies: The skill does not declare system or Python dependencies. To run the scripts you will likely need Python packages (pypdf, pdfplumber, pdf2image, pillow) and system binaries (poppler for pdf2image, ImageMagick 'magick' or 'convert' if you follow the visual-cropping instructions, and optionally qpdf/pdftk). Install these only from trusted sources and preferably in a controlled (virtualenv/container) environment. - Safety: The scripts only operate on files you provide and do not perform network calls or require secrets. Still, review the scripts (they are included) before running in a production environment. Pay attention to the monkeypatch in fill_fillable_fields.py that alters pypdf behavior — that can affect how PDFs are parsed and might interact poorly with other code using the same library. - License: LICENSE.txt places restrictive terms (Anthropic PBC) and forbids extracting or redistributing materials in many ways. Ensure those terms are acceptable for your use case. - Recommended precautions: run examples on non-sensitive sample PDFs first; execute in an isolated environment (virtualenv or container); install system dependencies from official package sources; if you require OCR or encryption features, confirm exactly which external tool will be used and whether it needs additional installation (e.g., Tesseract for OCR, qpdf for encryption operations). Overall: the skill appears to implement legitimate PDF form workflows, but the documentation overpromises some features and omits dependency details — treat it as useful but incomplete and verify environment/setup before relying on it.

Like a lobster shell, security has layers — review code before you run it.

chinesevk97bj1fnw0m643kmag7bkag08d83g5x4documentvk97bj1fnw0m643kmag7bkag08d83g5x4latestvk97bj1fnw0m643kmag7bkag08d83g5x4pdfvk97bj1fnw0m643kmag7bkag08d83g5x4
81downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

PDF Processing Guide

Overview

This guide covers essential PDF processing operations using Python libraries and command-line tools. For advanced features, JavaScript libraries, and detailed examples, see REFERENCE.md. If you need to fill out a PDF form, read FORMS.md and follow its instructions.

Quick Start

from pypdf import PdfReader, PdfWriter

# Read a PDF
reader = PdfReader("document.pdf")
print(f"Pages: {len(reader.pages)}")

# Extract text
text = ""
for page in reader.pages:
    text += page.extract_text()

Python Libraries

pypdf - Basic Operations

Merge PDFs

from pypdf import PdfWriter, PdfReader

writer = PdfWriter()
for pdf_file in ["doc1.pdf", "doc2.pdf", "doc3.pdf"]:
    reader = PdfReader(pdf_file)
    for page in reader.pages:
        writer.add_page(page)

with open("merged.pdf", "wb") as output:
    writer.write(output)

Split PDF

reader = PdfReader("input.pdf")
for i, page in enumerate(reader.pages):
    writer = PdfWriter()
    writer.add_page(page)
    with open(f"page_{i+1}.pdf", "wb") as output:
        writer.write(output)

Extract Metadata

reader = PdfReader("document.pdf")
meta = reader.metadata
print(f"Title: {meta.title}")
print(f"Author: {meta.author}")
print(f"Subject: {meta.subject}")
print(f"Creator: {meta.creator}")

Rotate Pages

reader = PdfReader("input.pdf")
writer = PdfWriter()

page = reader.pages[0]
page.rotate(90)  # Rotate 90 degrees clockwise
writer.add_page(page)

with open("rotated.pdf", "wb") as output:
    writer.write(output)

pdfplumber - Text and Table Extraction

Extract Text with Layout

import pdfplumber

with pdfplumber.open("document.pdf") as pdf:
    for page in pdf.pages:
        text = page.extract_text()
        print(text)

Extract Tables

with pdfplumber.open("document.pdf") as pdf:
    for i, page in enumerate(pdf.pages):
        tables = page.extract_tables()
        for j, table in enumerate(tables):
            print(f"Table {j+1} on page {i+1}:")
            for row in table:
                print(row)

Advanced Table Extraction

import pandas as pd

with pdfplumber.open("document.pdf") as pdf:
    all_tables = []
    for page in pdf.pages:
        tables = page.extract_tables()
        for table in tables:
            if table:  # Check if table is not empty
                df = pd.DataFrame(table[1:], columns=table[0])
                all_tables.append(df)

# Combine all tables
if all_tables:
    combined_df = pd.concat(all_tables, ignore_index=True)
    combined_df.to_excel("extracted_tables.xlsx", index=False)

reportlab - Create PDFs

Basic PDF Creation

from reportlab.lib.pagesizes import letter
from reportlab.pdfgen import canvas

c = canvas.Canvas("hello.pdf", pagesize=letter)
width, height = letter

# Add text
c.drawString(100, height - 100, "Hello World!")
c.drawString(100, height - 120, "This is a PDF created with reportlab")

# Add a line
c.line(100, height - 140, 400, height - 140)

# Save
c.save()

Create PDF with Multiple Pages

from reportlab.lib.pagesizes import letter
from reportlab.platypus import SimpleDocTemplate, Paragraph, Spacer, PageBreak
from reportlab.lib.styles import getSampleStyleSheet

doc = SimpleDocTemplate("report.pdf", pagesize=letter)
styles = getSampleStyleSheet()
story = []

# Add content
title = Paragraph("Report Title", styles['Title'])
story.append(title)
story.append(Spacer(1, 12))

body = Paragraph("This is the body of the report. " * 20, styles['Normal'])
story.append(body)
story.append(PageBreak())

# Page 2
story.append(Paragraph("Page 2", styles['Heading1']))
story.append(Paragraph("Content for page 2", styles['Normal']))

# Build PDF
doc.build(story)

Subscripts and Superscripts

IMPORTANT: Never use Unicode subscript/superscript characters (₀₁₂₃₄₅₆₇₈₉, ⁰¹²³⁴⁵⁶⁷⁸⁹) in ReportLab PDFs. The built-in fonts do not include these glyphs, causing them to render as solid black boxes.

Instead, use ReportLab's XML markup tags in Paragraph objects:

from reportlab.platypus import Paragraph
from reportlab.lib.styles import getSampleStyleSheet

styles = getSampleStyleSheet()

# Subscripts: use <sub> tag
chemical = Paragraph("H<sub>2</sub>O", styles['Normal'])

# Superscripts: use <super> tag
squared = Paragraph("x<super>2</super> + y<super>2</super>", styles['Normal'])

For canvas-drawn text (not Paragraph objects), manually adjust font the size and position rather than using Unicode subscripts/superscripts.

Command-Line Tools

pdftotext (poppler-utils)

# Extract text
pdftotext input.pdf output.txt

# Extract text preserving layout
pdftotext -layout input.pdf output.txt

# Extract specific pages
pdftotext -f 1 -l 5 input.pdf output.txt  # Pages 1-5

qpdf

# Merge PDFs
qpdf --empty --pages file1.pdf file2.pdf -- merged.pdf

# Split pages
qpdf input.pdf --pages . 1-5 -- pages1-5.pdf
qpdf input.pdf --pages . 6-10 -- pages6-10.pdf

# Rotate pages
qpdf input.pdf output.pdf --rotate=+90:1  # Rotate page 1 by 90 degrees

# Remove password
qpdf --password=mypassword --decrypt encrypted.pdf decrypted.pdf

pdftk (if available)

# Merge
pdftk file1.pdf file2.pdf cat output merged.pdf

# Split
pdftk input.pdf burst

# Rotate
pdftk input.pdf rotate 1east output rotated.pdf

Common Tasks

Extract Text from Scanned PDFs

# Requires: pip install pytesseract pdf2image
import pytesseract
from pdf2image import convert_from_path

# Convert PDF to images
images = convert_from_path('scanned.pdf')

# OCR each page
text = ""
for i, image in enumerate(images):
    text += f"Page {i+1}:\n"
    text += pytesseract.image_to_string(image)
    text += "\n\n"

print(text)

Add Watermark

from pypdf import PdfReader, PdfWriter

# Create watermark (or load existing)
watermark = PdfReader("watermark.pdf").pages[0]

# Apply to all pages
reader = PdfReader("document.pdf")
writer = PdfWriter()

for page in reader.pages:
    page.merge_page(watermark)
    writer.add_page(page)

with open("watermarked.pdf", "wb") as output:
    writer.write(output)

Extract Images

# Using pdfimages (poppler-utils)
pdfimages -j input.pdf output_prefix

# This extracts all images as output_prefix-000.jpg, output_prefix-001.jpg, etc.

Password Protection

from pypdf import PdfReader, PdfWriter

reader = PdfReader("input.pdf")
writer = PdfWriter()

for page in reader.pages:
    writer.add_page(page)

# Add password
writer.encrypt("userpassword", "ownerpassword")

with open("encrypted.pdf", "wb") as output:
    writer.write(output)

Quick Reference

TaskBest ToolCommand/Code
Merge PDFspypdfwriter.add_page(page)
Split PDFspypdfOne page per file
Extract textpdfplumberpage.extract_text()
Extract tablespdfplumberpage.extract_tables()
Create PDFsreportlabCanvas or Platypus
Command line mergeqpdfqpdf --empty --pages ...
OCR scanned PDFspytesseractConvert to image first
Fill PDF formspdf-lib or pypdf (see FORMS.md)See FORMS.md

Next Steps

  • For advanced pypdfium2 usage, see REFERENCE.md
  • For JavaScript libraries (pdf-lib), see REFERENCE.md
  • If you need to fill out a PDF form, follow the instructions in FORMS.md
  • For troubleshooting guides, see REFERENCE.md

Comments

Loading comments...