docx
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- Data Exposure & Exfiltration (HIGH): The file
ooxml/scripts/unpack.pyuseszipfile.ZipFile.extractall(), which is vulnerable to ZipSlip. A malicious .docx file with crafted filenames (e.g.,../../etc/passwd) can write data to arbitrary locations on the host system. - Privilege Escalation (HIGH): The
SKILL.mdinstructions direct the agent to executesudo apt-get installcommands. This represents an attempt to perform high-privilege operations that can compromise system integrity. - Dynamic Execution (MEDIUM): The skill's primary workflow requires the agent to 'Create and run JavaScript/TypeScript file' and 'Create and run Python script'. Since these scripts are generated dynamically by the agent based on user-provided documents, it facilitates a Remote Code Execution (RCE) vector via Indirect Prompt Injection.
- Command Execution (MEDIUM): The
ooxml/scripts/pack.pyscript andSKILL.mdusesubprocess.runand shell commands (soffice,pdftoppm,pandoc) with parameters derived from external filenames, which could lead to command injection if not properly sanitized. - Prompt Injection (LOW):
SKILL.mduses coercive directives such as 'MUST - FULLY READ FILE' and 'DO NOT set any range limits'. These instructions are designed to override the agent's standard behavior for summarization and context management.
- Indirect Prompt Injection (LOW): The skill processes untrusted .docx files and converts them to markdown or XML. Malicious instructions embedded in these files could influence the agent during the redlining or script generation phases (Category 8).
Recommendations
- AI detected serious security threats
Audit Metadata