docx
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (SAFE): The
ooxml/scripts/pack.pyscript executes thesofficesystem command for document validation. This is performed usingsubprocess.runwith a list of arguments, which prevents shell injection vulnerabilities. - [REMOTE_CODE_EXECUTION] (SAFE): No remote code execution patterns or unauthorized package installations were detected. The skill uses standard Python libraries and known dependencies like
defusedxmlandlxml. - [PROMPT_INJECTION] (LOW): As the skill is designed to unpack and display XML content from Office documents, it presents an indirect prompt injection surface.
- Ingestion points: The
unpack.pyanddocx.pyscripts read XML data from user-provided.docx,.pptx, and.xlsxfiles. - Boundary markers: None explicitly present in the provided templates to isolate document content from instructions.
- Capability inventory: The skill can read/write files and execute the
sofficecommand. - Sanitization: The skill uses
defusedxml.minidomwhich provides protection against common XML vulnerabilities (XXE), but does not sanitize the semantic content for LLM instructions.
Audit Metadata