docx
Warn
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes multiple command-line utilities including
pandoc,soffice,pdftoppm, andgitto perform document conversions, rendering, and character-level comparisons. It also utilizes several internal Python scripts for XML manipulation and validation. - [COMMAND_EXECUTION]: Instructions explicitly direct the agent to use
sudo apt-get installfor system dependencies, which involves executing commands with administrative privileges. - [EXTERNAL_DOWNLOADS]: The skill performs runtime installation of software packages via
npm,pip, andapt-getfrom external repositories. - [PROMPT_INJECTION]: An indirect prompt injection surface exists when processing external document files.
- Ingestion points: Untrusted content enters the agent context via Markdown generated by
pandocand raw XML fromunpack.py. - Boundary markers: Absent; document content is interpolated into the agent context without the use of delimiters or protective instructions.
- Capability inventory: Subprocess execution in
pack.pyandredlining.py, and file system write access indocument.py. - Sanitization: Absent; the skill does not escape or filter document content before it is displayed to the agent for analysis.
Audit Metadata