doc
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is designed to ingest and manipulate untrusted external data (.docx files), creating a significant attack surface for indirect prompt injection where a document could contain hidden instructions that override the agent's behavior.
- Ingestion points:
scripts/render_docx.py(line 46) andpython-docx(referenced inSKILL.mdworkflow) read external document content into the agent context. - Boundary markers: The instructions do not specify any delimiters or safety warnings to distinguish between document content and agent instructions.
- Capability inventory: The skill executes system commands via
subprocess.run(tosofficeandpdftoppm) and performs file system modifications. - Sanitization: No sanitization or filtering of the document content is performed before processing.
- [Dynamic Execution] (MEDIUM): Unsafe XML parsing in
scripts/render_docx.py. - Evidence: Line 52 uses
xml.etree.ElementTree.fromstring()to parseword/document.xml. This library is vulnerable to XML External Entity (XXE) attacks, which could allow an attacker to read local files or perform SSRF if a malicious DOCX is processed. - [Command Execution] (LOW): Runtime execution of system tools.
- Evidence:
scripts/render_docx.py(lines 122, 142) usessubprocess.runto callsofficeandpdftoppm. While the arguments are largely structured, the input file paths are dynamic, and the use oflibreofficein headless mode provides a large attack surface for document-based exploits.
Recommendations
- AI detected serious security threats
Audit Metadata