markdown-to-msword-converter
Pass
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill requires the 'python-docx' package (specified as 'pip:docx') to handle the creation and manipulation of MS Word binary files. This is a well-known and standard library for this purpose.
- [COMMAND_EXECUTION]: The orchestration script 'scripts/run_bulk_md_to_docx.py' utilizes 'subprocess.run' to execute the conversion engine 'scripts/md_to_docx.py' for each file in a batch. This is a standard pattern for bulk processing within agent skills and uses the current Python executable.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and processes user-provided Markdown files.
- Ingestion points: The 'scripts/md_to_docx.py' script reads the content of any '.md' file targeted for conversion using 'Path.read_text'.
- Boundary markers: There are no explicit delimiters or system instructions within the scripts that isolate the Markdown content from the agent's higher-level logic during the orchestration phase.
- Capability inventory: The skill has the ability to read and write files and execute local Python scripts via subprocess calls.
- Sanitization: While the script parses Markdown into OOXML elements, it does not sanitize the text for embedded instructions that might influence an agent if it were to read the file content directly.
Audit Metadata