pptx
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (MEDIUM): The skill is designed to process external Office documents, creating an attack surface where malicious files can influence the system. Mandatory Evidence Chain: 1. Ingestion points:
ooxml/scripts/unpack.pyandooxml/scripts/validation/docx.pyextract zip contents from user-provided files. 2. Boundary markers: None present. 3. Capability inventory:zipfile.extractallinunpack.pyanddocx.py,subprocess.run(callingsoffice) inpack.py, andprs.saveinrearrange.py. 4. Sanitization: Usesdefusedxmlfor XML parsing to mitigate XXE, but lacks path validation for zip extraction. - [Privilege Escalation] (MEDIUM): The use of
zipfile.extractall()in bothooxml/scripts/unpack.pyandooxml/scripts/validation/docx.pywithout path validation is vulnerable to the Zip Slip attack. A crafted Office document could contain filenames with path traversal segments (e.g.,../../target) to overwrite arbitrary files on the filesystem, potentially leading to privilege escalation or remote command execution if system configuration or executable files are targeted.
Audit Metadata