docx-processing-superdoc
Fail
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The skill uses
npxto download and execute the@superdoc-dev/clipackage from the npm registry. This author and organization are not part of the trusted sources list, making the execution of this code a significant security risk. - REMOTE_CODE_EXECUTION (HIGH): By specifying
@latestin thenpxcommands, the skill ensures that the most recent version of the package is fetched and run every time. This is a dangerous practice as an attacker compromising the@superdoc-devnpm account could push a malicious update that would be automatically executed by any agent using this skill. - COMMAND_EXECUTION (MEDIUM): The skill's primary function is to execute shell commands. While intended for document processing, the underlying tool has full access to the shell environment where it is executed.
- PROMPT_INJECTION (LOW): As the skill is designed to 'read' and 'search' Word documents, it is vulnerable to Indirect Prompt Injection (Category 8). If a processed
.docxfile contains hidden instructions, the agent might inadvertently follow them after the text is extracted. No boundary markers or sanitization logic is present to mitigate this.
Recommendations
- AI detected serious security threats
Audit Metadata