pptx
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The scripts
ooxml/scripts/unpack.pyandooxml/scripts/validation/docx.pyusezipfile.extractall()to unpack Office documents. This method is vulnerable to 'ZipSlip' (path traversal) attacks, where a maliciously crafted archive containing filenames with traversal sequences (e.g.,../../target) can overwrite arbitrary files on the agent's host system. - DATA_EXFILTRATION (MEDIUM): The file
ooxml/scripts/validation/docx.pyuseslxml.etree.parse()to process XML files extracted from untrusted documents. Standardlxmlparsing is vulnerable to XML External Entity (XXE) attacks, which can be exploited to read sensitive local files or perform internal network probing. This is inconsistent with other parts of the skill that correctly usedefusedxml. - COMMAND_EXECUTION (LOW): The script
ooxml/scripts/pack.pycalls the external binarysoffice(LibreOffice) usingsubprocess.run. While the arguments are passed as a list to prevent shell injection, it introduces a dependency on an external system component with a large attack surface. - PROMPT_INJECTION (LOW): This skill ingests and processes Office documents, representing an indirect prompt injection surface. 1. Ingestion points: XML content is extracted and parsed in
unpack.pyanddocx.py. 2. Boundary markers: None identified; extracted text and XML are processed without delimiters or 'ignore' instructions. 3. Capability inventory: The skill can write files to the system viazipfileand execute external commands viasoffice. 4. Sanitization: Whiledefusedxmlis used in some modules, the skill lacks validation for ZIP member paths and does not sanitize document content against adversarial instructions.
Audit Metadata