docx
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (SAFE): The
ooxml/scripts/pack.pyfile usessubprocess.runto callsofficefor document validation. The call is restricted to a headless conversion to HTML, includes a 10-second timeout, and uses fixed command-line arguments, which is a safe and appropriate implementation for verifying file integrity. - DATA_EXFILTRATION (SAFE): The skill demonstrates strong security posture by using
defusedxmlinooxml/scripts/unpack.pyandooxml/scripts/pack.py. This prevents XML External Entity (XXE) and expansion attacks. While thelxmllibrary used inooxml/scripts/validation/docx.pyis not inherently 'defused', the workflow ensures that XML files are sanitized bydefusedxmlduring the unpacking stage before being processed by the validator. - INDIRECT_PROMPT_INJECTION (LOW): As a tool designed to extract and process data from external documents, the skill serves as an ingestion point for indirect prompt injection.
- Ingestion points:
ooxml/scripts/unpack.py(extracts XML from .docx, .pptx, and .xlsx files). - Boundary markers: None; the tool provides the structured XML content directly.
- Capability inventory: Reading and writing to the file system and converting documents via
soffice. - Sanitization: The skill mitigates structural XML risks using the
defusedxmllibrary.
Audit Metadata