pptx
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The script
ooxml/scripts/pack.pyexecutes thesoffice(LibreOffice) binary viasubprocess.runto validate documents. Processing untrusted files through a complex external binary increases the attack surface, as vulnerabilities in the office suite could be exploited by a crafted document. - [REMOTE_CODE_EXECUTION] (MEDIUM): In
ooxml/scripts/validation/docx.py, the skill useslxml.etree.parse()on XML files without explicit protection against XML External Entity (XXE) attacks (e.g.,resolve_entities=False). Whiledefusedxmlis used elsewhere, this specific instance on unpacked document content could allow an attacker to read local files or perform server-side request forgery (SSRF) if the XML is maliciously crafted. - [INDIRECT_PROMPT_INJECTION] (MEDIUM): This skill is designed to process external content (Office documents) and has the capability to write and execute commands based on that content.
- Ingestion points:
ooxml/scripts/unpack.pyandscripts/rearrange.pyread content from zip-compressed Office files. - Boundary markers: Absent; there are no delimiters or instructions to ignore embedded content during the processing of document XML.
- Capability inventory: File writing (
zipfile,xml_file.write_bytes) and subprocess execution (soffice). - Sanitization: Inconsistent;
defusedxmlis used in some scripts, but rawlxmlis used in others.
Audit Metadata