pptx
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The
ooxml/scripts/pack.pyscript executes the externalsoffice(LibreOffice) binary viasubprocess.runto validate document integrity. While arguments are largely constrained, it processes user-influenced file paths and relies on the local environment's office suite configuration. - [PROMPT_INJECTION] (LOW): The skill possesses an attack surface for indirect prompt injection as it processes and interprets untrusted Office documents provided by users.
- Ingestion points: Document contents are read and extracted in
ooxml/scripts/unpack.py,ooxml/scripts/pack.py, andscripts/rearrange.pyusingzipfileand XML parsing. - Boundary markers: The scripts do not implement explicit boundary markers or instructions to the agent to disregard instructions potentially embedded within the document XML.
- Capability inventory: The skill has the capability to perform extensive file system operations (read/write/extract) and trigger external application execution via subprocess.
- Sanitization: The skill effectively uses
defusedxmlfor most XML parsing tasks to prevent XXE. However,lxml.etreeis utilized inooxml/scripts/validation/docx.pywithout explicit security-hardened parser settings.
Audit Metadata