editing-docx-files
Warn
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/office/soffice.pyperforms runtime compilation of an embedded C source string usinggcc. The resulting shared library is injected into the LibreOffice (soffice) process via theLD_PRELOADenvironment variable to shimAF_UNIXsocket operations. This dynamic execution and process injection pattern is used to bypass socket restrictions in sandboxed environments. - [COMMAND_EXECUTION]: The script
scripts/accept_changes.pydynamically generates a LibreOffice Basic macro file (Module1.xba) within a temporary user profile and executes it using thesofficecommand line to automate the acceptance of tracked changes in documents. - [COMMAND_EXECUTION]: Multiple scripts, including
scripts/office/unpack.py,scripts/office/pack.py, andscripts/office/validators/redlining.py, utilizesubprocess.runto execute system utilities such asgit,pandoc, andsofficefor document processing and validation.
Audit Metadata