Skip to main content

Aggressive, safety-first PDF shrinker for scanned documents. CLI tool: PDF in, shrunk searchable PDF out.

Project description

HankPDF

Aggressive, safety-first PDF shrinker for scanned documents. Takes a PDF in, produces a shrunk/resized searchable PDF out. Local tool. No network, no telemetry, no data leaves your machine. Targets 8–15× typical compression (up to 200× on text-dominant scans) while preserving OCR searchability and guaranteeing no silent content loss.

Repo / package name: pdf-smasher. Product brand: HankPDF.

Status: v0.1.0 — first public release. 389 tests passing on Linux / macOS / Windows CI. Available via PyPI (pip install pdf-smasher), GHCR (docker pull ghcr.io/hank-ai/hankpdf:v0.1.0), or from the repo (see Setup below).

What it does

Takes oversized scanned PDFs (typical input: 200-page, 800 MB image scans) and produces compact, searchable, verified outputs. CLI-first. Two install targets, both run the same engine locally:

  1. Python packagepip install pdf-smasher. Brings the compress() API and the hankpdf console script. Requires Tesseract + jbig2enc via your system package manager (one-line install on every major OS — see docs/INSTALL.md).
  2. Docker imageghcr.io/hank-ai/hankpdf:latest. All native deps baked in; zero host setup. Ideal for CI/CD, SFTP upload wrappers, batch jobs, and any environment where installing Tesseract on the host is inconvenient.

Not a service, not a GUI, not a signed installer. HankPDF is a command-line tool. It runs entirely on the user's machine, never uploads PDFs anywhere, never phones home, writes no analytics, stores no persistent state beyond what the user asks (output PDF, optional sidecar manifest).

What makes it different

  • Permissive license throughout — no AGPL, no commercial SDK dependency. Built entirely on Apache-2.0 / BSD / MPL-2.0 components. We can ship, modify, and redistribute freely.
  • Content-preservation invariant — every output is gated by OCR-text diff, tile-level SSIM, and structural audit. We refuse rather than silently corrupt.
  • Weird-PDF robust — encrypted, signed, corrupt-xref, JBIG2-in, form XObjects, color profiles, linearized, tagged, PDF/A-3-embedded: each class has an explicit detect-and-handle policy. None crash the pipeline.
  • Honest compression targets — for scanned-document inputs, we deliver ≥3× guaranteed, 8–15× typical, 50–200× best-case on text-only scans. For PDFs that are already efficiently encoded (vector slide decks, presentations, native exports from Word/Powerpoint), the MRC re-rasterize-and-recompress pipeline can produce larger output — so the default --min-ratio 1.5 short-circuits to passthrough rather than churning, and text-only inputs now passthrough even faster via the per-page MRC gate (see below). See docs/PERFORMANCE.md for measured ratios across input types and settings.

Defaults preserve any existing text layer (byte-faithful to the source, no flag required). --ocr means ensure searchable — it runs Tesseract only on pages where the input has no text or the existing text fails a quality heuristic. --strip-text-layer opts out (text-free output); --re-ocr forces Tesseract everywhere even when the input has good native text. See docs/PERFORMANCE.md for measured behavior across the four scenarios.

Output modes

HankPDF produces three output shapes out of the same hankpdf command:

PDF (default):

hankpdf in.pdf -o out.pdf

Chunked PDF (for email attachment limits):

hankpdf in.pdf -o out.pdf --max-output-mb 25
# writes out_001.pdf, out_002.pdf, ... if the merged output exceeds 25 MB

Chunk filenames are zero-padded, 1-indexed, and preserve page order. A single page that's already larger than the cap is emitted alone (you'll see a stderr warning).

Scheme change in schema v2: chunk filenames are now {base}_{NNN}{ext} (1-indexed, min 3-digit zero-pad). The previous scheme was {base}_{idx}{ext} (0-indexed, unpadded). Automation pinned to out_0.pdf should migrate to out_001.pdf or glob out_*.pdf with a lexical sort.

Per-page image export (JPEG, PNG, or WebP):

hankpdf in.pdf -o page.jpg --pages 1 --image-dpi 150 --jpeg-quality 80
hankpdf in.pdf -o dump.png --image-dpi 200
hankpdf in.pdf -o small.webp --pages 1-5 --webp-quality 70

Image export skips the MRC compression pipeline; each requested page is rendered and saved as a standalone image. The output format is inferred from the -o extension (or set explicitly via --output-format). Use --pages to restrict to a subset — without it, every page is exported.

Passthrough on low compressibility

By default HankPDF returns the input unchanged if the achieved ratio is below 1.5× — producing an MRC output larger than the input serves no one. The run exits 0 with status="passed_through" (exit code 2) and a warning code passthrough-ratio-floor on stderr; report.output_sha256 equals report.input_sha256 and the verifier is marked "skipped" with fail-closed sentinels so downstream gates can't mistake passthrough for a clean verified run.

Overrides:

hankpdf in.pdf -o out.pdf --min-ratio 1.0   # force MRC output regardless
hankpdf in.pdf -o out.pdf --min-ratio 0     # disable the floor entirely
hankpdf in.pdf -o out.pdf --min-input-mb 5  # also passthrough if input < 5 MB

--min-input-mb is a sibling gate for inputs so small that the MRC per-page overhead (~2-3 s/page) isn't worth the ratio gain; it emits warning code passthrough-min-input-mb.

A third gate runs before both of those: a per-page MRC-worthiness classifier that skips the pipeline entirely on pages with no meaningful image content. For each page, image_xobject_bytes / page_byte_budget is compared against --per-page-min-image-fraction (default 0.30); pages below the threshold are emitted verbatim (no rasterize, no compose, no verify). When no page meets the threshold the whole-doc shortcut returns the input bytes unchanged with warning code passthrough-no-image-content; partial runs emit pages-skipped-verbatim-N. The gate is bypassed by --re-ocr, --strip-text-layer, --legal-mode, --verify, or --per-page-min-image-fraction 0. See docs/PERFORMANCE.md "Per-page MRC gate" for measurements.

Setup

Hand this repo to Claude Code / Codex / any coding agent

If you're not a developer, the fastest path is to clone the repo, open it in an agent-capable editor (Claude Code, Cursor, Copilot, etc.), and paste this prompt:

Read README.md and docs/INSTALL.md. Detect my operating system. Install every native dependency HankPDF needs (Python 3.14, uv, Tesseract, qpdf, jbig2enc), clone any missing binaries, run uv sync --all-extras, then run uv run pytest -q and report the result. If any step needs my input (sudo password, GitHub auth, WSL activation), stop and tell me.

The agent reads the OS-specific blocks below, runs the commands, reports test output. You'll be up in ~5-15 minutes depending on network and whether jbig2enc needs building from source.

Docker (any OS)

Zero host setup. Works on macOS, Linux, and Windows with Docker Desktop.

docker pull ghcr.io/hank-ai/hankpdf:latest

# macOS / Windows (Docker Desktop handles uid mapping):
docker run --rm -v "$PWD:/data" ghcr.io/hank-ai/hankpdf:latest \
    /data/in.pdf -o /data/out.pdf

# Linux (pass -u so the container can write to your bind mount):
docker run --rm -u "$(id -u):$(id -g)" -v "$PWD:/data" \
    ghcr.io/hank-ai/hankpdf:latest \
    /data/in.pdf -o /data/out.pdf

For production use, pin to an immutable tag or digest:

# Immutable — a specific release:
docker pull ghcr.io/hank-ai/hankpdf:<version-tag>

# Immutable — a specific commit SHA:
docker pull ghcr.io/hank-ai/hankpdf@sha256:<digest>

# `:latest` is MUTABLE — it floats with every main-branch merge.
# Fine for local dev; never for production batch jobs where you
# want to know exactly what bytes ran.

Every pushed image is signed with cosign (keyless, via GitHub OIDC) and carries a SLSA v1 build-provenance attestation. Verify before running in production:

cosign verify ghcr.io/hank-ai/hankpdf:<version-tag> \
    --certificate-identity-regexp 'https://github\.com/hank-ai/hankpdf/\.github/workflows/docker\.yml@refs/(heads|tags)/.+' \
    --certificate-oidc-issuer https://token.actions.githubusercontent.com

See docker/README.md for tag semantics, uid rationale, and local-build instructions.

Manual setup — macOS

# 1. Python 3.14 + uv
brew install python@3.14
curl -LsSf https://astral.sh/uv/install.sh | sh

# 2. Native deps (tesseract + qpdf via brew; jbig2enc from source)
brew install tesseract qpdf
git clone --depth=1 https://github.com/agl/jbig2enc.git /tmp/jbig2enc
cd /tmp/jbig2enc && ./autogen.sh && ./configure && make && sudo make install

# 3. HankPDF
git clone git@github.com:hank-ai/hankpdf.git
cd hankpdf
uv sync --all-extras
uv run hankpdf --version       # smoke test
uv run pytest -q               # full test suite (~1 min)

Manual setup — Linux (Debian / Ubuntu)

# 1. Python 3.14 (deadsnakes PPA on Ubuntu <25.04)
sudo add-apt-repository -y ppa:deadsnakes/ppa
sudo apt update
sudo apt install -y python3.14 python3.14-venv python3.14-dev

# 2. uv
curl -LsSf https://astral.sh/uv/install.sh | sh
source "$HOME/.local/bin/env"

# 3. Native deps
sudo apt install -y tesseract-ocr libtesseract-dev qpdf jbig2enc-tools

# 4. HankPDF
git clone git@github.com:hank-ai/hankpdf.git
cd hankpdf
uv sync --all-extras
uv run hankpdf --version
uv run pytest -q

(Fedora/RHEL: swap apt install for dnf install -y tesseract qpdf leptonica-devel; jbig2enc still needs building from source per docs/INSTALL.md.)

Manual setup — Windows

Three paths. Pick Docker unless you need a native Python install.

Option 0 — Docker Desktop (easiest for non-developers):

# Install Docker Desktop from docker.com
docker pull ghcr.io/hank-ai/hankpdf:latest
docker run --rm -v "${PWD}:/data" ghcr.io/hank-ai/hankpdf:latest `
    /data/in.pdf -o /data/out.pdf

No Python, no native deps, no WSL needed. Works on Windows 10/11 Pro/Enterprise/Home with WSL2 backend enabled. Docker Desktop licensing is free for personal use, education, and small businesses (<= 250 employees and < $10M annual revenue). Larger orgs need a Docker Business license or can install Docker Engine via WSL instead.

Option A — WSL2 (recommended): run the Linux instructions above inside WSL Ubuntu. From PowerShell (admin):

wsl --install -d Ubuntu-24.04

Reboot, then follow the Linux block inside the Ubuntu shell. Your Windows files are at /mnt/c/Users/<YourUser>/....

Option B — Native Windows (PowerShell):

winget install Python.Python.3.14
choco install tesseract qpdf -y
irm https://astral.sh/uv/install.ps1 | iex

# Install jbig2.exe for full MRC compression (optional; CCITT G4 fallback works without it).
# Tagged URL — main is a mutable branch, so we pin to a specific release.
# Replace the tag with whatever "jbig2-windows-v*" tag you want to install.
$tag = "jbig2-windows-v0.1.0"
irm "https://github.com/hank-ai/hankpdf/releases/download/$tag/install_jbig2_windows.ps1" | iex

git clone git@github.com:hank-ai/hankpdf.git
cd hankpdf
uv sync --all-extras
uv run hankpdf --version
uv run pytest -q

The jbig2 installer pulls a prebuilt jbig2.exe (plus its runtime DLLs) from the hankpdf GitHub Releases, extracts it to %LOCALAPPDATA%\hankpdf\bin, and registers that directory on your user PATH. No administrator required. Open a new terminal after the installer runs so the PATH update is picked up. Source and build recipe live in scripts/install_jbig2_windows.ps1 and .github/workflows/windows-jbig2enc.yml.

Without the jbig2 installer, the MRC pipeline falls back to CCITT G4 for the text layer — outputs are typically 10-20% larger than with jbig2enc, but every other feature works identically and all tests pass.

Put hankpdf on your PATH

After uv sync succeeds, you can either keep prefixing with uv run hankpdf, or install the console script system-wide:

uv tool install --from . pdf-smasher
hankpdf --version

Running tests

uv run pytest -q                          # all 389 tests (~1 min)
uv run pytest tests/unit -v               # unit only (~10 s)
uv run pytest -m integration -v           # integration only
uv run pytest --cov=pdf_smasher           # with coverage
uv run ruff check pdf_smasher tests       # lint
uv run mypy pdf_smasher                   # type check

Troubleshooting

  • hankpdf --version — prints Python version, hankpdf version, and every native dep's version + path. If one is missing, that's your install problem.
  • uv run python -c "import pdf_smasher; print('OK')" — import smoke test.
  • OCR unit tests auto-skip when tesseract isn't on PATH. The rest of the suite should pass regardless.
  • Still stuck? Open an issue with hankpdf --version output attached.

Documentation

Doc Purpose
docs/ARCHITECTURE.md Design decisions, rationale, system diagram. The why.
docs/SPEC.md Functional spec — CLI contract, API surface, behaviors, edge-case policies. The what.
docs/PERFORMANCE.md Measured compression ratios + wall-time across input types and settings. The how-fast and how-small.
docs/KNOWLEDGE.md Reference material: MRC algorithm, codec trade-offs, license notes, PDF internals, prior-art summaries. The background.
docs/ROADMAP.md Phased implementation checklist. The how and when.

License

HankPDF is licensed under Apache-2.0 (LICENSE).

Commercial use

HankPDF is cleared for commercial use. The dependency tree was chosen specifically to avoid the commercial-licensing blockers common in PDF/OCR tooling (Ghostscript AGPL, Poppler GPL, ABBYY/Nuance per-seat licensing).

See THIRD_PARTY_LICENSES.md for the full dependency audit — every Python package, native binary, and transitive system library with its SPDX identifier and commercial-use status. That file is the canonical reference for any licensing question; re-audit before every release.

Attribution for bundled/runtime third-party code is in NOTICE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pdf_smasher-0.1.0.tar.gz (299.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

pdf_smasher-0.1.0-py3-none-any.whl (104.1 kB view details)

Uploaded Python 3

File details

Details for the file pdf_smasher-0.1.0.tar.gz.

File metadata

  • Download URL: pdf_smasher-0.1.0.tar.gz
  • Upload date:
  • Size: 299.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for pdf_smasher-0.1.0.tar.gz
Algorithm Hash digest
SHA256 f9f6b3e740aeb0b17c9af969fc8dcfddabe4d7f6cfb8087b967d82e88c38ed5d
MD5 8efd9b799ca3c5049286a0a06349967d
BLAKE2b-256 2a2ef982fcf92383b789467eba8d619346cd9e50ea55435af2aab52d742c268b

See more details on using hashes here.

Provenance

The following attestation bundles were made for pdf_smasher-0.1.0.tar.gz:

Publisher: release.yml on hank-ai/pdf-smasher

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file pdf_smasher-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: pdf_smasher-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 104.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for pdf_smasher-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 3f030ee4d1cb79fcb47a7f45eca6bf7d0d26650543da8f11f1d6a9f10a097963
MD5 c03fc177405d1ade7e47298674766a4c
BLAKE2b-256 6731f1e746e45cbd048d539550e9e3611d97f547beecb7c04f5b64bcfba93fb5

See more details on using hashes here.

Provenance

The following attestation bundles were made for pdf_smasher-0.1.0-py3-none-any.whl:

Publisher: release.yml on hank-ai/pdf-smasher

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page