docx-processing
Pass
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runto call thelibreofficecommand-line utility for converting Word documents to PDF. This is a standard and expected operation for the described document processing workflow. - [EXTERNAL_DOWNLOADS]: The documentation references several well-known and standard Python libraries, including
python-docx,docxtpl, anddocx2pdf, which are required for document manipulation and conversion tasks. - [PROMPT_INJECTION]: The skill implements a template-based document generation system that ingests data from external sources like CSV files and APIs. This identifies a potential surface for indirect prompt injection. 1. Ingestion points: Data is read from
recipients.csvor provided via API contexts to populatedocxtpltemplates. 2. Boundary markers: The provided examples do not use explicit delimiters or instructions to ignore embedded commands in the source data. 3. Capability inventory: The skill has the capability to write files to the local system (doc.save) and execute system commands (libreofficevia subprocess). 4. Sanitization: Implementation patterns include basic error handling for missing template variables but do not demonstrate sanitization or escaping of the ingested data strings.
Audit Metadata