docx
Warn
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Dynamic Execution (HIGH): The script
scripts/office/soffice.pyimplements a compatibility shim for LibreOffice by writing C source code to/tmp, compiling it withgcc, and then injecting the resulting shared library into thesofficeprocess using theLD_PRELOADenvironment variable. This is a high-risk technique for modifying process behavior at runtime. Per the primary purpose rule, this finding is evaluated as MEDIUM as it is a necessary workaround for sandboxed environments. - Dynamic Execution (MEDIUM): The script
scripts/accept_changes.pydynamically generates a LibreOffice Basic macro and saves it to a temporary profile to automate document 'Accept All Changes' functionality. This involves runtime script generation and execution. - Indirect Prompt Injection (LOW): The skill is designed to ingest and process untrusted Office document data (XML). It uses
defusedxmlfor parsing, which mitigates XML External Entity (XXE) attacks. However, because it interpolates processed document text into subprocess commands (such asgit diffinscripts/office/validators/redlining.py), a surface for indirect prompt injection exists. In accordance with guidelines, this category is rated LOW. - Command Execution (LOW): The skill frequently executes external system tools including
soffice,git, andgcc. These operations are transparently implemented and essential for document unpacking, validation, and conversion.
Audit Metadata