doc
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The helper script
scripts/render_docx.pyutilizessubprocess.runto call system utilities likesoffice(LibreOffice) andpdftoppm. These calls are implemented using list-based arguments rather than shell strings, which effectively prevents command injection vulnerabilities. - [EXTERNAL_DOWNLOADS]: The skill references several standard dependencies including the
python-docxandpdf2imagePython packages, as well aslibreofficeandpoppler-utilssystem packages. These are well-known, legitimate tools for document conversion and manipulation. - [PROMPT_INJECTION]: The skill is designed to ingest and process external
.docxfiles, creating an attack surface for indirect prompt injection. If a processed document contains malicious instructions, the agent might inadvertently follow them during the rendering or review phase. - Ingestion points:
scripts/render_docx.pyparses the OOXML structure of Word documents from zip archives. - Boundary markers: No explicit delimiters are used in the instructions to separate document content from agent instructions.
- Capability inventory: The skill can execute local rendering commands and write files to the output directory.
- Sanitization: The script uses path normalization and reads specific, expected components from the DOCX structure.
Audit Metadata