docx
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The script
ooxml/scripts/pack.pyexecutes the system commandsoffice(LibreOffice) to validate documents. Evidence:subprocess.run(['soffice', '--headless', ...])invalidate_documentfunction. Risk: If an attacker can control the file path or content, they might exploit vulnerabilities in LibreOffice, although command injection via shell is mitigated by using argument lists. - [DATA_EXFILTRATION] (MEDIUM): The skill is vulnerable to XML External Entity (XXE) attacks because it uses
lxml.etree.parsewithout disabling entity resolution when validating Word documents. Evidence:lxml.etree.parse(str(xml_file))inooxml/scripts/validation/docx.py. Risk: A malicious XML file within a.docxpackage could be used to read local files or perform server-side request forgery (SSRF). - [COMMAND_EXECUTION] (MEDIUM): The unpacking logic uses
zipfile.extractall()without path validation or filters, making it susceptible to Zip Slip (path traversal) attacks. Evidence:zipfile.ZipFile(input_file).extractall(output_path)inooxml/scripts/unpack.py. Risk: A malicious ZIP file with '../' in its filenames could overwrite sensitive files outside the intended directory.
Audit Metadata