docx
Warn
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Runtime compilation and injection of a C library.\n
- Evidence:
scripts/office/soffice.pywrites C source code to a temporary file and executesgccto compile it into a shared object. This object is then loaded usingLD_PRELOADduring execution.\n - Impact: This is a risky dynamic execution pattern that shims system behavior and modifies process execution.\n- [COMMAND_EXECUTION]: Use of shell commands for document processing and validation.\n
- Evidence:
subprocess.runcalls are present inscripts/accept_changes.py,scripts/office/soffice.py, andscripts/office/validators/redlining.pyto execute binaries likesoffice,gcc, andgit.\n- [COMMAND_EXECUTION]: Potential path traversal vulnerability in document extraction.\n - Evidence:
scripts/office/unpack.pyuseszipfile.extractall()to unpack Word document contents without validating the paths within the archive.\n - Impact: This method is susceptible to Zip Slip attacks, where a malicious archive could overwrite system files if path traversal sequences are used in filenames.\n- [PROMPT_INJECTION]: Vulnerability surface for indirect prompt injection.\n
- Ingestion points:
scripts/office/unpack.pyextracts document XML for manipulation.\n - Boundary markers: Absent. XML content is processed without delimiters or instructions to ignore embedded commands.\n
- Capability inventory: Extensive subprocess and file access capabilities are available within the skill's scripts.\n
- Sanitization: Absent. The skill does not sanitize or validate document content before processing.
Audit Metadata