docx
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [Command Execution] (LOW): The script
ooxml/scripts/pack.pyinvokes thesofficebinary throughsubprocess.runto perform document validation. - [Data Exposure & Exfiltration] (MEDIUM): In
ooxml/scripts/validation/docx.py,lxml.etree.parse()is used on XML files from untrusted Office documents without disabling external entities, creating an XXE vulnerability that could lead to local file disclosure. - [Indirect Prompt Injection] (MEDIUM): The skill ingests untrusted data from Office files (Ingestion points:
unpack.py,validate.py) and lacks boundary markers. While it usesdefusedxmlfor some tasks, the use oflxmlrepresents a failure in sanitization before interacting with system capabilities (Capability:sofficesubprocess). - [Unverifiable Dependencies] (LOW): Dependencies include
lxmlanddefusedxml. The specific use oflxmlfor parsing untrusted document content is a security concern.
Audit Metadata