pptx
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): The file
ooxml/scripts/unpack.pyuseszipfile.ZipFile.extractall()to unpack Office documents, which is vulnerable to Zip Slip. An attacker can use path traversal sequences (e.g.,../../) in filenames to overwrite arbitrary files on the system. - [REMOTE_CODE_EXECUTION] (HIGH): The file
ooxml/scripts/validation/docx.pyuseslxml.etree.parse()to read XML from documents. Without explicit security settings (such asresolve_entities=False), this is vulnerable to XML External Entity (XXE) attacks, which can lead to local file disclosure or SSRF. - [COMMAND_EXECUTION] (HIGH): The script
ooxml/scripts/pack.pyexecutes thesofficebinary (LibreOffice) viasubprocess.run(). This creates an attack surface where a maliciously crafted document could exploit the office suite's rendering or conversion engine during the validation process. - [PROMPT_INJECTION] (HIGH): The skill ingests and processes external content from Word and PowerPoint files. This creates a significant Indirect Prompt Injection surface where instructions embedded in the documents could be interpreted by the agent, potentially leading to unauthorized actions.
Recommendations
- AI detected serious security threats
Audit Metadata