docx
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- Data Exposure & Exfiltration (HIGH): Vulnerable XML parsing in
ooxml/scripts/validation/docx.py. Evidence: The script useslxml.etree.parse()on XML files extracted from untrusted documents without disabling external entity resolution, making it vulnerable to XML External Entity (XXE) attacks. - Unverifiable Dependencies & Remote Code Execution (HIGH): Zip Slip (Path Traversal) vulnerability in
ooxml/scripts/unpack.pyandooxml/scripts/validation/docx.py. Evidence: Both scripts usezipfile.ZipFile.extractall()on untrusted input files without validating extraction paths, which allows a malicious archive to overwrite arbitrary files on the system. - Indirect Prompt Injection (LOW): The skill processes untrusted OOXML data. 1. Ingestion points:
ooxml/scripts/unpack.pyandooxml/scripts/validation/docx.py. 2. Boundary markers: Absent. 3. Capability inventory: File system write access (via Zip extraction) and external command execution (sofficeinpack.py). 4. Sanitization: Inconsistent usage ofdefusedxmland missing validation of ZIP entry paths.
Recommendations
- AI detected serious security threats
Audit Metadata