docx
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Runtime compilation of C source code. The file
scripts/office/soffice.pyprogrammatically invokesgccto compile a shared library (lo_socket_shim.so) from a hardcoded source string to manage AF_UNIX socket interactions. - [COMMAND_EXECUTION]: System environment manipulation for library injection.
scripts/office/soffice.pyuses theLD_PRELOADmechanism to force the LibreOffice process to load the dynamically compiled shim, which intercepts core system calls likesocket()andaccept(). - [COMMAND_EXECUTION]: Extensive use of external subprocesses. The skill relies on executing multiple binaries including
soffice,pandoc,pdftoppm, andgitacross various utility scripts. - [PROMPT_INJECTION]: Vulnerability to Indirect Prompt Injection. The skill is designed to ingest and process untrusted data from external
.docxfiles. It lacks explicit boundary markers or protective instructions to prevent the model from obeying malicious commands embedded within the document's XML content during extraction or editing phases.
Audit Metadata