pptx
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): In
ooxml/scripts/pack.py, thevalidate_documentfunction usessubprocess.runto execute thesoffice(LibreOffice) binary for document validation. While it passes arguments as a list to prevent shell injection, it relies on the security and presence of an external system binary.- [REMOTE_CODE_EXECUTION] (LOW): The scriptooxml/scripts/unpack.pyuseszipfile.ZipFile.extractall()on user-provided Office documents. This method is susceptible to 'Zip Slip' (directory traversal) if a malicious document contains filenames with../sequences, potentially allowing files to be written to arbitrary locations on the filesystem.- [SAFE] (LOW): Inooxml/scripts/validation/docx.py, thelxml.etreelibrary is used to parse XML files extracted from the document. Unlike thedefusedxmlusage in other files, this parsing does not explicitly disable entity resolution, which could pose an XXE risk if the unpacking logic were bypassed or if the environment'slxmldefaults are insecure.- [SAFE] (SAFE): The skill correctly implements thedefusedxmllibrary inooxml/scripts/pack.pyandooxml/scripts/unpack.pyto securely handle XML data, which is a critical protection when dealing with Office formats.
Audit Metadata