docx-processing-openai
Warn
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: Deceptive metadata identified in
SKILL.md. The author field is set to "OpenAI", which conflicts with the identified author "lawvable". This is a form of impersonation that may mislead users or agents into assuming the skill is an official product of a trusted organization. - [COMMAND_EXECUTION]: The script
scripts/render_docx.pyexecutes system commands (sofficeandpdftoppm) viasubprocess.run. While it constructs command arguments as lists to mitigate shell injection, it relies on the execution of external binaries with parameters derived from input file paths. - [PROMPT_INJECTION]: Indirect prompt injection surface detected in
scripts/render_docx.py. Thecalc_dpi_via_ooxml_docxfunction parses theword/document.xmlfile from untrusted DOCX archives usingxml.etree.ElementTree, which is vulnerable to XML External Entity (XXE) attacks. - Ingestion points: Reads and parses
word/document.xmlfrom user-supplied DOCX files. - Boundary markers: None; the XML content is parsed directly without delimiters or instruction-ignoring warnings.
- Capability inventory: File system access, subprocess execution of
soffice, and image generation. - Sanitization: No XML sanitization or use of safe alternatives like
defusedxmlis present.
Audit Metadata