markdown-to-msword-converter
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill directs the agent to execute local Python scripts (
md_to_docx.py,run_bulk_md_to_docx.py,verify_docx.py) using theBashtool as part of its core conversion workflow.\n- [EXTERNAL_DOWNLOADS]: The documentation references dependencies on Python packages (pypandoc,markdown,docx) and thepandocsystem-level binary. These are common and standard tools for document processing.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through the ingestion of untrusted Markdown files from the environment.\n - Ingestion points: Untrusted Markdown data is read for processing as defined in the Phase 1 engine execution of
SKILL.md.\n - Boundary markers: Absent; the instructions do not provide delimiters or warnings for the agent to ignore instructions embedded in the source Markdown.\n
- Capability inventory: The skill uses
Bash,Read, andWritetools (configured inSKILL.md) to perform file operations and script execution.\n - Sanitization: Absent; the skill relies on the integrity check script
verify_docx.pyafter conversion rather than sanitizing input data.
Audit Metadata