docx-processing

Pass

Audited by Gen Agent Trust Hub on Apr 2, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses subprocess.run to call the libreoffice command-line utility for converting Word documents to PDF. This is a standard and expected operation for the described document processing workflow.
  • [EXTERNAL_DOWNLOADS]: The documentation references several well-known and standard Python libraries, including python-docx, docxtpl, and docx2pdf, which are required for document manipulation and conversion tasks.
  • [PROMPT_INJECTION]: The skill implements a template-based document generation system that ingests data from external sources like CSV files and APIs. This identifies a potential surface for indirect prompt injection. 1. Ingestion points: Data is read from recipients.csv or provided via API contexts to populate docxtpl templates. 2. Boundary markers: The provided examples do not use explicit delimiters or instructions to ignore embedded commands in the source data. 3. Capability inventory: The skill has the capability to write files to the local system (doc.save) and execute system commands (libreoffice via subprocess). 4. Sanitization: Implementation patterns include basic error handling for missing template variables but do not demonstrate sanitization or escaping of the ingested data strings.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 2, 2026, 12:43 AM