pptx
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The script
ooxml/scripts/unpack.pyuseszipfile.ZipFile(input_file).extractall(output_path)without validating entry paths. This is a classic ZipSlip vulnerability, allowing a malicious Office document to overwrite files outside the intended directory via path traversal (e.g.,../../target). - [COMMAND_EXECUTION] (MEDIUM): The script
ooxml/scripts/pack.pyexecutes an external binarysoffice(LibreOffice) usingsubprocess.run. While it avoids shell injection by using a list, processing untrusted documents through a complex office suite provides a significant attack surface for RCE via document-based exploits. - [INDIRECT_PROMPT_INJECTION] (HIGH): The skill processes external XML content from Office documents. The file
ooxml/scripts/validation/docx.pyuseslxml.etree.parse()without explicitly disabling external entities or DTDs, creating a risk for XML External Entity (XXE) attacks if the parser environment is not sufficiently hardened by default. - [UNVERIFIABLE_DEPENDENCIES] (MEDIUM): The skill relies on external packages including
lxml,python-pptx,defusedxml, andsix. Whiledefusedxmlis used for some operations, the inconsistent use of safe parsers across the codebase increases the risk profile.
Recommendations
- AI detected serious security threats
Audit Metadata