docx
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (LOW): The
ooxml/scripts/pack.pyscript executes thesoffice(LibreOffice) utility viasubprocess.runto validate document conversion. While implemented using a list of arguments to prevent shell injection, it represents an interaction with system-level binaries.- INDIRECT_PROMPT_INJECTION (LOW): The skill processes external OOXML data, creating a surface for indirect prompt injection. - Ingestion points:
ooxml/scripts/unpack.py(zip extraction) andooxml/scripts/validation/docx.py(XML parsing). - Boundary markers: None present in the processing scripts.
- Capability inventory: File system access (read/write) and subprocess execution (
soffice). - Sanitization: Uses
defusedxmlinpack.pyandunpack.py, butdocx.pyuseslxml.etree.parsewithout explicit security flags (likeresolve_entities=False), which could theoretically lead to XXE issues depending on thelxmlenvironment configuration.
Audit Metadata