word-document-processor
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The
SKILL.mdfile contains explicit instructions for the agent to usesudo apt-get installfor various system dependencies. Executing commands with root privileges is a severe security risk that allows for arbitrary system modification. - [PROMPT_INJECTION] (MEDIUM): The instruction file includes mandatory commands for the agent to read
docx-js.mdandooxml.md"completely from start to finish" and explicitly forbids setting range limits. This behavior is typical of attempts to flood the agent's context or ensure the processing of hidden instructions in large, opaque files not included in the skill distribution. - [EXTERNAL_DOWNLOADS] (MEDIUM): The skill relies on downloading and installing several external packages (
pandoc,libreoffice,poppler-utils, and thedocxnpm package) from public registries at runtime, which introduces a dependency on external third-party code and potential supply-chain risks. - [PROMPT_INJECTION] (LOW): The skill possesses a significant surface for Indirect Prompt Injection (Category 8) as it processes user-provided
.docxfiles through text extraction and XML unpacking without boundary markers or sanitization of the extracted content. - Ingestion points: Untrusted data enters the agent context through
pandoc(inSKILL.md) andunpack.pywhich extracts XML from user documents. - Boundary markers: Absent; there are no instructions to use delimiters or ignore instructions embedded within the processed document text.
- Capability inventory: The skill allows the agent to generate and run scripts, execute system binaries like
soffice(inpack.py), and perform file system operations. - Sanitization: The skill uses
defusedxmlinpack.pyandunpack.pyto prevent XML-based attacks (XXE), but it provides no logical sanitization or filtering for the natural language content extracted from documents. - [COMMAND_EXECUTION] (MEDIUM): The
ooxml/scripts/pack.pyscript usessubprocess.runto execute thesofficebinary. While it avoids shell execution by passing a list of arguments, it still provides a mechanism for interacting with system-level software using potentially untrusted file paths.
Recommendations
- AI detected serious security threats
Audit Metadata