moai-document-processing
Pass
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is designed to analyze and extract content from various document formats (DOCX, PDF, PPTX, XLSX), creating a surface for indirect prompt injection where malicious instructions embedded in a processed document could attempt to influence the agent's behavior.
- Ingestion points: Document content is extracted and processed in
document.py(Word),inventory.py(PowerPoint), andrecalc.py(Excel). - Boundary markers: No explicit delimiters or warnings to ignore embedded instructions were found in the text extraction logic.
- Capability inventory: The skill has access to tools including
Bash,Write,Edit, andWebFetch, and executes system commands for document processing. - Sanitization: No explicit sanitization or filtering of the extracted text content is implemented before it enters the agent's context.
- [COMMAND_EXECUTION]: The skill's scripts (
recalc.py,thumbnail.py,pack.py,validate.py) frequently utilizesubprocess.runto invoke system utilities such assoffice(LibreOffice),pandoc,pdftoppm, andpdftotext. These operations are required for the skill's primary functionality of document conversion and formula recalculation.
Audit Metadata