skills/mrgoonie/claudekit-skills/docx/Gen Agent Trust Hub

docx

Pass

Audited by Gen Agent Trust Hub on Feb 24, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: Employs standard system utilities including pandoc, LibreOffice (soffice), and pdftoppm for document conversion, PDF generation, and image rendering. It also uses git for character-level diffing during document validation.
  • [EXTERNAL_DOWNLOADS]: Instructions include the setup of necessary libraries via official package managers including apt-get, npm, and pip for tools like pandoc, docx, and defusedxml.
  • [INDIRECT_PROMPT_INJECTION]: The skill's primary function involves processing untrusted .docx files, which presents an attack surface for indirect prompt injection.
  • Ingestion points: Content is read into the agent context through pandoc markdown conversion and raw XML extraction from unpacked archives (e.g., word/document.xml).
  • Boundary markers: Delimiters for extracted document content are not explicitly defined in the instructions.
  • Capability inventory: The skill has access to file system operations and subprocess execution for document processing tasks.
  • Sanitization: The implementation uses the defusedxml library for all XML parsing operations, effectively mitigating XML External Entity (XXE) and other XML-based injection attacks.
  • [PROMPT_INJECTION]: The instructions contain meta-directives requiring the agent to read full documentation files without pagination to maintain technical context; these are assessed as benign instructional constraints for task performance.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 24, 2026, 07:53 AM