docx
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes external binaries such as
pandoc,soffice(LibreOffice),pdftoppm, andgitusingsubprocess.run. These calls use argument lists rather than shell strings, preventing typical command injection vulnerabilities. These tools are necessary for document conversion, visual analysis, and change validation. - [EXTERNAL_DOWNLOADS]: The documentation provides instructions for installing several standard system and programming dependencies, including
pandoc,libreoffice,poppler-utils, thedocxNode.js package, and thedefusedxmlPython package. All referenced packages are established and legitimate tools. - [PROMPT_INJECTION]: Instructions in
SKILL.mdand technical references mandate that the agent must read several long documentation files in their entirety without using range limits. While this overrides default behavior for context management, it is intended to ensure the agent correctly understands the complex technical API for document manipulation. - [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted external files (.docx). Ingestion points: Files are processed by
pandocand unpacked byunpack.py. Boundary markers: None explicitly defined for extracted text. Capability inventory: Scripts can perform file writes and execute system commands viasubprocess.run. Sanitization: The skill usesdefusedxmlfor secure XML parsing andhtml.escapefor sanitizing metadata such as author names, reducing the risk of structure-based attacks.
Audit Metadata