docxmakebetter
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (SAFE): The
ooxml/scripts/pack.pyscript invokes thesoffice(LibreOffice) command-line utility viasubprocess.runto validate document integrity. This is a functional requirement for verifying that the generated Office files are not corrupt and is executed without shell injection risk. - [PROMPT_INJECTION] (LOW): This finding relates to Category 8 (Indirect Prompt Injection) as the skill is designed to process external document data.
- Ingestion points:
ooxml/scripts/unpack.pyextracts XML contents from user-provided Office documents (.docx, .pptx, .xlsx). - Boundary markers: The skill does not implement LLM-level boundary markers as it primarily consists of script-based processing logic.
- Capability inventory: File system read/write access and local command execution via
soffice. - Sanitization: The skill uses the
defusedxmllibrary across its scripts to mitigate XML External Entity (XXE) and other XML-based injection attacks, providing robust sanitization for the data input. - [DATA_EXFILTRATION] (SAFE): All file operations are localized to the input directory and temporary system directories. No network operations or patterns associated with credential theft were detected.
Audit Metadata