odt
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill handles complex untrusted data (ODT/XML) and has capabilities that could be abused if an attacker embeds instructions in the processed documents.\n
- Ingestion points:
scripts/unpack_odt.pyandscripts/odt_document.py(viascripts/utilities.py) ingest XML content and assets from external ODT packages.\n - Boundary markers: Absent. The skill does not implement delimiters or specific instructions to isolate untrusted content from the agent's logic.\n
- Capability inventory: Extensive file-writing via
scripts/pack_odt.pyandscripts/odt_document.py; external tool execution viascripts/validate_rng.py(subprocess.run).\n - Sanitization: The skill uses
defusedxmlto mitigate XML-specific attacks, but lacks sanitization for embedded natural language instructions.\n- Data Exposure & Exfiltration (LOW): The skill performs outbound network requests to a non-whitelisted domain.\n - Evidence:
scripts/fetch_odf_schemas.pyusesurllib.request.urlopento connect tohttps://docs.oasis-open.org.\n- External Downloads (MEDIUM): Automated downloading of schema files from external sources.\n - Evidence:
scripts/fetch_odf_schemas.pyretrieves.rngand.owlfiles from OASIS. This bypasses local security checks as indicated by the# noseccomment in the source code.\n- Command Execution (LOW): Execution of external validation tools.\n - Evidence:
scripts/validate_rng.pyusessubprocess.runto calljing.\n- Dynamic Execution (LOW): Use ofrunpyfor internal script orchestration.\n - Evidence: Multiple scripts and wrappers use
runpy.run_pathto execute local Python files.
Recommendations
- AI detected serious security threats
Audit Metadata