docx
Fail
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/office/soffice.pydynamically writes C source code to a temporary file and executes thegcccompiler to create a shared library (lo_socket_shim.so) at runtime. It then utilizes theLD_PRELOADenvironment variable to inject this library into thesofficeprocess to intercept and shim system-level socket calls. This represents a form of dynamic code generation and process injection. - [COMMAND_EXECUTION]: Several components of the skill, including
scripts/accept_changes.py,scripts/office/soffice.py, andscripts/office/validate.py, execute external binaries such assoffice(LibreOffice),pandoc, andgitviasubprocess.runwith potentially untrusted arguments. - [PROMPT_INJECTION]: The skill possesses a significant surface for indirect prompt injection due to its pipeline for processing untrusted Word (.docx) files.
- Ingestion points: Untrusted data enters the agent context through
scripts/office/unpack.py, which extracts raw XML from docx ZIP archives, and through thepandoctext extraction mentioned inSKILL.md. - Boundary markers: Absent. The skill does not implement delimiters or instructions to ensure the agent disregards commands found within document content.
- Capability inventory: The skill has extensive capabilities, including arbitrary shell command execution, filesystem access, and the ability to compile binary code.
- Sanitization: Although the skill uses
defusedxmlto mitigate XML-based attacks (XXE), it does not provide comprehensive sanitization or validation for the natural language content extracted from processed documents.
Recommendations
- AI detected serious security threats
Audit Metadata