docx
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
SKILL.mdfile contains instructions to install necessary system dependencies usingsudo apt-get install, which requests elevated privileges from the user or agent environment. - [COMMAND_EXECUTION]: The skill uses the Python
subprocessmodule inooxml/scripts/pack.pyandooxml/scripts/validation/redlining.pyto execute external system tools likesofficeandgit. - [PROMPT_INJECTION]: The skill possesses a surface for Indirect Prompt Injection by extracting and processing the contents of user-supplied
.docxfiles. - Ingestion points: XML content is extracted from document archives in
ooxml/scripts/unpack.pyand presented to the agent for editing and analysis. - Boundary markers: There are no explicit delimiters or specific instructions provided to the agent to ignore or neutralize embedded natural language commands found within the document text.
- Capability inventory: The skill possesses significant capabilities including writing to the local file system, executing system utilities via subprocesses, and providing instructions for further software installation.
- Sanitization: Although the skill uses the
defusedxmllibrary to successfully mitigate XML-specific threats like XXE, it does not sanitize the extracted natural language content for instructions designed to hijack the agent's behavior.
Audit Metadata