pptx
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): Vulnerability to XML External Entity (XXE) attacks.
- Evidence: In
ooxml/scripts/validation/docx.py, the skill useslxml.etree.parse()on XML files extracted from Office documents. By default,lxmlmay resolve external entities if not explicitly configured otherwise (e.g.,resolve_entities=False). An attacker could provide a document containing malicious entities to read local files or perform Server-Side Request Forgery (SSRF). - [COMMAND_EXECUTION] (HIGH): Vulnerability to ZipSlip (Directory Traversal).
- Evidence: In
ooxml/scripts/unpack.py, the skill useszipfile.ZipFile(input_file).extractall(output_path)without validating the filenames within the ZIP archive. A malicious document could contain files with paths like../../tmp/evil.sh, allowing an attacker to overwrite arbitrary files on the system. - [COMMAND_EXECUTION] (MEDIUM): Unsafe execution of LibreOffice (
soffice) on untrusted data. - Evidence: In
ooxml/scripts/pack.py, thevalidate_documentfunction runssubprocess.run(['soffice', '--headless', ...])on the newly packed document. Processing untrusted, complex OOXML files with a massive application like LibreOffice exposes the system to potential exploitation of vulnerabilities in the office suite's document parsers. - [PROMPT_INJECTION] (HIGH): Significant Indirect Prompt Injection surface (Category 8).
- Ingestion points: The
ooxml/scripts/unpack.pyscript reads arbitrary.docx,.pptx, and.xlsxfiles provided by the user or an external source. - Boundary markers: Absent. The skill parses the raw XML content without using delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill has the ability to write to the file system, execute subprocesses (
soffice), and perform complex XML manipulation. - Sanitization: Inconsistent. While
defusedxmlis used in some scripts, the validation logic reverts tolxml(unsafe), and thepython-pptxlibrary relies on internal parsers that may be exploitable.
Recommendations
- AI detected serious security threats
Audit Metadata