word-documents
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
create_word_documentandmodify_word_documenttools allow the execution of arbitrary Python code provided as a string parameter. This allows the agent to perform any action permitted by its local Python environment beyond document manipulation. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection attacks because it lacks safeguards for the code it executes.
- Ingestion points: The
python_codeparameter in document creation and modification tools. - Boundary markers: None identified. The skill does not provide instructions to the agent to sanitize or ignore instructions embedded in the data being formatted into Word documents.
- Capability inventory: The skill uses Python with access to libraries like
pandasandnumpy. Without explicit sandboxing, this includes the ability to perform file system operations and potentially network requests. - Sanitization: There is no validation or filtering of the
python_codeinput to ensure it only performs document-related tasks.
Audit Metadata