docx
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (HIGH): Unsafe ZIP extraction in
ooxml/scripts/unpack.pyandooxml/scripts/validation/docx.py. The use ofzipfile.ZipFile.extractall()without path validation is vulnerable to Zip Slip, enabling path traversal and arbitrary file overwrite via malicious ZIP entries. - DATA_EXFILTRATION (HIGH): XXE vulnerability in
ooxml/scripts/validation/docx.py. The script useslxml.etree.parse()on untrusted XML files within the OOXML package without disabling entity resolution, which can be exploited for local file disclosure or SSRF. - COMMAND_EXECUTION (MEDIUM): Subprocess execution of
sofficeinooxml/scripts/pack.py. The skill invokes the LibreOffice binary on attacker-controlled document data, which presents a significant attack surface for binary exploitation. - INDIRECT_PROMPT_INJECTION (HIGH): High capability surface with untrusted data ingestion. Evidence Chain: (1) Ingestion: Untrusted Office files in
unpack.pyanddocx.py. (2) Boundaries: No instruction boundary markers or sanitization. (3) Capabilities:subprocess.run(soffice) andzipfilewrite operations. (4) Sanitization: Missing for path traversal and XML entities.
Recommendations
- AI detected serious security threats
Audit Metadata