docx
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The skill performs runtime C compilation and process injection. In
scripts/office/soffice.py, it dynamically writes C source code to a temporary file, compiles it usinggcc, and then injects the resulting shared object into the LibreOffice process usingLD_PRELOAD. This is a highly sophisticated dynamic execution pattern that can be used for system-level bypasses.\n- [PROMPT_INJECTION] (HIGH): The skill is vulnerable to Indirect Prompt Injection and XML External Entity (XXE) attacks. It ingests untrusted Office document content (XML) inscripts/office/unpack.py,scripts/office/validators/redlining.py, andscripts/office/helpers/simplify_redlines.py. While it usesdefusedxmlin some places, it uses insecure parsers likexml.etree.ElementTreeandlxml.etreewithout entity resolution disabled in critical validation steps, allowing malicious files to potentially read local data or manipulate agent reasoning.\n- [COMMAND_EXECUTION] (MEDIUM): The skill executes dynamic LibreOffice macros.scripts/accept_changes.pygenerates a LibreOffice Basic macro at runtime and executes it via thevnd.sun.star.scriptprotocol. This provides an additional vector for executing arbitrary logic within the Office environment.
Recommendations
- AI detected serious security threats
Audit Metadata