docx
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [Privilege Escalation] (HIGH): The skill explicitly instructs the agent to use
sudo apt-get installfor multiple dependencies (pandoc, libreoffice, poppler-utils). Prompting an agent to execute commands with root privileges is a major security risk. - [Indirect Prompt Injection] (HIGH): The skill processes untrusted external files (.docx) and provides the agent with capabilities to execute shell commands and run generated scripts based on the content of those files.
- Ingestion points:
.docxfiles viapandocandpython ooxml/scripts/unpack.py. - Boundary markers: None identified in the instructions for separating document content from agent instructions.
- Capability inventory: Execution of
pandoc,soffice,pdftoppm, and custom Python/JavaScript scripts. - Sanitization: While
defusedxmlis listed as a dependency, there is no evidence of sanitization for the text content extracted from documents before it is processed by the agent. - [Dynamic Execution] (HIGH): The workflow for editing documents involves the agent creating and running custom Python and JavaScript/TypeScript scripts at runtime. This allows for arbitrary code execution if the logic is influenced by malicious document content.
- [Prompt Injection] (MEDIUM): The skill contains repeated instructions to 'NEVER set any range limits' when reading documentation files, which is an attempt to bypass standard agent constraints or context management safety features.
- [External Downloads] (LOW): The skill requires installing several external packages via
apt,npm, andpip. While these are from standard repositories, the requirement to install them at runtime increases the attack surface.
Recommendations
- AI detected serious security threats
Audit Metadata