docx
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runto execute system commands includingsoffice,pandoc, andgit. Most notably,scripts/office/soffice.pycompiles an embedded C source shim at runtime usinggccand then utilizes theLD_PRELOADenvironment variable to inject the resulting library into thesofficeprocess. This is used to manage AF_UNIX socket behavior in restricted environments. - [EXTERNAL_DOWNLOADS]:
SKILL.mdspecifies the installation of thedocxpackage from the public npm registry. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface as it processes untrusted document content.
- Ingestion points: Document XML content is read and parsed from
.docxarchives inscripts/office/unpack.py. - Boundary markers: Absent; there are no specific instructions or delimiters used to ensure the agent ignores instructions found within the document data.
- Capability inventory: The skill possesses high-privilege capabilities including arbitrary command execution (
subprocess.run), runtime compilation (gcc), and extensive file system access. - Sanitization: The skill utilizes
defusedxmlto protect against standard XML vulnerabilities like XXE, though some metadata extraction scripts use the non-hardenedxml.etree.ElementTreelibrary.
Audit Metadata