Word Document Handler
Warn
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
SKILL.mdfile contains instructions for the agent to executesudo apt-get installto install system dependencies such aspandoc,libreoffice, andpoppler-utils. These commands require elevated system privileges. - [COMMAND_EXECUTION]: The script
ooxml/scripts/pack.pyusessubprocess.runto invoke thesoffice(LibreOffice) binary for document validation purposes. - [EXTERNAL_DOWNLOADS]: The
SKILL.mdfile facilitates the installation of thedocxlibrary from the well-known npm registry vianpm install -g docx. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests and processes untrusted data from Microsoft Word documents.
- Ingestion points: Text is extracted from
word/document.xmlusingooxml/scripts/validation/redlining.pyand converted to markdown viapandocas described in the skill workflow. - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are used when presenting extracted text to the agent.
- Capability inventory: The skill possesses the ability to execute terminal commands and perform file system operations.
- Sanitization: No sanitization or filtering of the extracted document content is performed before it is added to the agent context.
- [PROMPT_INJECTION]: The instructions in
SKILL.mdanddocx-js.mdinclude strong directives such as "MANDATORY - READ ENTIRE FILE" and "NEVER set any range limits," which are designed to override the agent's default processing constraints.
Audit Metadata