pptx
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Arbitrary File Write / Zip Slip] (HIGH): The files
ooxml/scripts/unpack.pyandooxml/scripts/validation/docx.pyusezipfile.ZipFile.extractall()on input Office documents without validating that the filenames within the archive are safe. An attacker can create a .docx or .pptx file containing filenames with path traversal sequences (e.g.,../../.ssh/authorized_keys) to overwrite sensitive files when the agent processes the document. - [XML External Entity (XXE) Vulnerability] (MEDIUM): The file
ooxml/scripts/validation/docx.pyuseslxml.etree.parse()to process XML components of the Office documents. By default,lxmlmay resolve external entities. If an attacker provides a document with a malicious XML structure, they could potentially read local files or perform server-side request forgery (SSRF). Note thatdefusedxmlis correctly used in other parts of the skill (pack.py,unpack.py), but not here. - [Subprocess Execution] (MEDIUM): The file
ooxml/scripts/pack.pyexecutes thesoffice(LibreOffice) binary viasubprocess.run. While used for legitimate validation, invoking a heavyweight office suite on untrusted input increases the attack surface for memory corruption or other vulnerabilities. - [Indirect Prompt Injection Surface] (LOW): The skill is designed to ingest and process external Office documents, which are a common vector for indirect prompt injection. \n 1. Ingestion points:
unpack.py,rearrange.pyread external files.\n 2. Boundary markers: None found; the LLM context is exposed to raw document contents.\n 3. Capability inventory: File writing (pack.py), Subprocess execution (pack.py).\n 4. Sanitization: Usesdefusedxmlfor some operations, but lacks general input sanitization for LLM interpolation.
Recommendations
- AI detected serious security threats
Audit Metadata